• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/235

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

235 Cards in this Set

  • Front
  • Back


Which is not one of the core functions of data management?



A. Data program coordination



B. Data stewardship



C. Data asset use



D. Data design/architecture


D. Data design/architecture


Which of the core data management functions is responsible for the identification, architecting,
and modeling of data assets shared across two or more business areas or enterprise-wide?



A. Data development



B. Data stewardship



C. Enterprise data integration



D. Data program coordination



C. Enterprise data integration



Which of these data management roles establishes, standardizes, and certifies business data in assigned data subject areas?



A. Policy maker



B. Data steward



C. Architect



D. Integrator



B. Data steward



Which of these roles is common to all the Data Administration job descriptions and in particular is a major accountability of the DA manager?



A. Managing the DA function



B. Use of tools for data modeling



C. Maintaining the repository architecture



D. Establishing and enforcing data standards



D. Establishing and enforcing data standards



In which Framework cell is a program specification such as an object or action diagram?



A. Time, Designer



B. Function, Builder



C. Motivation, Builder



D. Network, Designer



B. Function, Builder



What is the source of the data element standards presented in the text?



A. International Standard (ISO) 11179



B. Data Management Association (DAMA)



C. Insurance Services Office (ISO)



D. American National Standards Institute (ANSI)



A. International Standard (ISO) 11179




What kind of rule is based on the meaning of name components of data elements?




A. Semantic Rules




B Lexical Rules




C. Zachman’s Rules




D. Meta Rules




A. Semantic Rules




What does disparate data result from?




A. Different business needs for the same kinds of facts




B. Different storage methods and technologies




C. Lack of systems integration




D. Lack of awareness and understanding of available data




D. Lack of awareness and understanding of available data




Data that are essentially not alike or are distinctly different in kind, quality or character?




A. Comparate




B Information




C. Disparate




D. Semantic




C. Disparate




What is the data administration role in data security?




A. Perform backup and recovery




B. Enforce data security policy




C. Maintain lists of access privileges for users




D. Assume insecurity and identify issues







D. Assume insecurity and identify issues




Which of these is a critical success factor in managing a purchased package implementation?




A. Training for users




B. Measurement process




C. A strong data administration group




D. An enterprise-wide data architecture







B. Measurement process




Which of these is NOT a recommended purchased package evaluation criterion?




A. Does the package data model conform to your enterprise data model?




B. How does it conform to applicable standards?




C. How well does the package fit the business requirements?




D. How well do you understand the Products history: Upgrades, Enhancements, Fixes?







A. Does the package data model conform to your enterprise data model?




Which of the following information would be part of the “vendor service” portion of a tool evaluation?




A. Research and development capabilities




B. Education and training




C. Scaleable and expandable




D. Financial stability




B. Education and training




Which of the following is NOT part of the “vendor quality” portion of a tool evaluation?




A. Indicate any Quality awards or quality certificates the vendor has achieved




B. Describe the vendor’s customer survey process




C. Describe the vendor’s philosophy for frequency of hardware and software upgrades




D. Does the vendor currently conduct customer forums or focus groups?




C. Describe the vendor’s philosophy for frequency of hardware and software upgrades




What is the scope of data management in the Internet?




A. Perform same data management functions for expanded enterprise and Internet




B. Promote and manage the use of XML for all e-commerce




C. Work with systems groups on Intranet applications




D. Set new standards for Internet applications




A. Perform same data management functions for expanded enterprise and Internet




There are six attributes of organizational memory. Which one is described as being easily moved to a decision maker?




A. Shareable




B. Transportable




C. Timely




D. Relevant




B. Transportable




Which of the following is not an attribute of organizational memory?




A. Relevant




B. Shareable




C. Secure




D. Volatile



D. Volatile




Which of the following is an example of the relationship of data to information, and information to knowledge?




A. Data are working telephones, which are used to send information. Knowledge is the ability to use the telephone.




B. Data are the raw materials to make a telephone, information is an assembled telephone, and knowledge is the ability to use the telephone to call someone.




C. Data are the raw materials to make a telephone, information is an assembled telephone, and knowledge is the telephone line.




D. Data are the raw materials to make a telephone, knowledge is the instruction sheet to assemble a working telephone, which is called information.







B. Data are the raw materials to make a telephone, information is an assembled telephone, and knowledge is the ability to use the telephone to call someone.




With regard to the information characteristics of richness and hardness, what best describes a rumor that a coworker tells you in a face-to-face conversation?




A. Hard and lean




B. Soft and lean




C. Hard and rich




D. Soft and rich








D. Soft and rich





Scorekeeping as an informational tool does which of the following?




A. Identifies causes of problems




B. Tracks changes in the data dictionary




C. Measures organizational performance



D. Distributes goals to managers and employees


C. Measures organizational performance




Structured Query Language (SQL) is both a DML and a DDL. What do DML and DDL stand for?




A. Data maintenance language and data description language




B. Data master language and data detail language




C. Data management language and data dictionary language




D. Data manipulation language and data definition language







D. Data manipulation language and data definition language






What is the purpose of the primary key?




A. Open a table




B. Provide a unique address for each row of a table




C. Provide a unique address for each column in a table




D. It is the only key that can be sorted in a query





B. Provide a unique address for each row of a table




Why create another entity in a database?



A. Resolve problems when inserting, updating, or deleting data



B. Capture additional detail that can be used



C. Simplify sort searches in complex databases



D. Segregate different data into finer levels of detail



A. Resolve problems when inserting, updating, or deleting data




What is the difference between a subquery and a correlated subquery?




A. A subquery is evaluated once whereas a correlated subquery must be evaluated repeatedly.




B. A subquery is evaluated repeatedly whereas a correlated subquery is evaluated once.




C. A correlated subquery is a subquery of a subquery.



D. A correlated subquery is evaluated last whereas the subquery is evaluated first


A. A subquery is evaluated once whereas a correlated subquery must be evaluated repeatedly.




What is a virtual table called?




A. A virtual query




B. The visual output of a query




C. A view




D. Display of SQL code




C. A view




What does two one-to-many relationships linked to a third entity represent?




A. A multiple entity to single entity relationship




B. A single entity relationship




C. A one-to-one relationship




D. A many-to-many relationship




D. A many-to-many relationship




Can a foreign key be part of a primary key?




A. Yes




B. Never




C. Only in a recursive relationship




D. None of the above




A. Yes




Mapping a one-to-many recursive relationship is similar to mapping a standard one-to-many relationship, with the addition of the following:




A. A column for a composite key is added to the one end of the relationship




B. A column for the foreign key is added to the many end of the relationship




C. A column for the foreign key is added to the one end of the relationship




D. A not null constraint is placed on the foreign key of the many end of the relationship




B. A column for the foreign key is added to the many end of the relationship




In querying a recursive relationship, how do you distinguish between the two copies of the same table?




A. There is no need to distinguish




B. By completely redefining each attribute with a new name




C. Create a table alias in SQL by adding a suffix to the table name




D. Create a virtual table with a different name




C. Create a table alias in SQL by adding a suffix to the table name




How is a many-to-many recursive relationship different from a many-to-many relationship?




A. A many-to-many recursive relationship does not have an associative entity




B. Only a many-to-many relationship is composed of two one-to-many relationships




C. In a many-to-many recursive relationship, a second associative entity is used




D. None of the above.







D. None of the above.




What are the four building blocks of a data model?




A. Entity, attribute, relationship and descriptor




B. Entity, model, attribute, index




C. Attribute, relationship, identifier, and entity




D. Attribute, entity, index, primary key




C. Attribute, relationship, identifier, and entity




What is meant by a weak or dependent entity?




A. The dependent entity has no primary key and depends on the foreign keys of other entities.




B. The dependent entity is the same as a virtual table.




C. The dependent entity results from one-to-many relationships.




D. The dependent entity relies on another entity for its existence and identity.




D. The dependent entity relies on another entity for its existence and identity.







Which data model entity is a byproduct of many-to-many relationships?




A. Associative entity




B. Aggregate entity




C. Descriptor entity




D. Subordinate entity







A. Associative entity




What is NOT one of the seven habits of a highly effective data modeler?




A. Immerses oneself into the task environment




B. Challenges existing assumptions




C. Completes the data model, data models are not left ill-defined




D. Does things in isolation




D. Does things in isolation




In a one-to-many relationship between two tables, how does the primary key of the “one” table relate to the “many” table?




A. The primary key of the “one” table becomes the primary key of the “many” table.




B. The primary key of the “many” table becomes the primary key of the “one” table.




C. The primary key of the “one” table cannot be the primary or foreign key of the “many” table.




D. The primary key of the “one table” becomes a foreign key of the “many” table.



D. The primary key of the “one table” becomes a foreign key of the “many” table.



What are used to accelerate data access and ensure uniqueness.




A. An Index.




B. An Alternate Key.




C. A Primary Key.




D. Referential Integrity.



A. An Index.




What key concept of the relational model deals with a set of values all of the same data type?




A. Candidate key




B. Primary key




C. Relations




D. Domain




D. Domain




What rule in the relational model says that no component of the primary key of a relation may be null?




A. The referential integrity rule




B. The relational integrity rule




C. The primary key integrity rule




D. The entity integrity rule




D. The entity integrity rule




An ordered set of columns that form a primary or foreign key is called:




A. A composite key




B. A foreign key relative




C. A unique identifier




D. A Join




A. A composite key




A unique key means:



A. A primary key that cannot appear as a foreign key in another entity



B. No two values of a key are the same.



C. The column does not appear in any other entity.



D. Two or more foreign keys that form a composite key



B. No two values of a key are the same.



Which of the following is an advantage of the object oriented(OO) model over the relational model?




A. The OO model follows the record-at-a-timeprocessing of programming languages.


B. In the OO model, changing the state of oneobject directly changes the state of any other object.


C. In the OO model, classes are self-containedand do not inherit attributes from the super-class.


D. None of the above.



D. None of the above.


Whatis encapsulation? Why is it desirable?


Encapsulationis a central concept of OO. It meansthat all processing that changes the state of an object (i.e., changes thevalue of any of its attributes) is done within that object. Encapsulation implies that an object isshielded from interference from other objects; that is, an object cannot directlychange any other objects.

Whatare the advantages of inheritance?


Inheritancesimplifies specification and programming and is especially important forcreating reusable objects.


Whatare the advantages of OO approach?


Manyorganizations have a substantial backlog of applications because it takessignificant resources to build new applications and maintain existingsystems. The need to increaseprogramming productivity and reduce the cost of maintaining systems are themajor reasons for adopting the OO approach.


Howdoes OO reduce maintenance costs?


Maintenancecosts are decreased by using OO concepts. Maintenance costs are lowered becauselogical and syntactical errors are decreased, missing or incorrect specificationsoccur less frequently, the addition of features is easy, and it accommodateswell to business changes.



Howdoes a data model differ from a procedural model?


Datamodeling deals with what the system needs to remember. A data model is often called static becauseit tends to be fairly stable and requires little to change over time. This does not mean, however, that it willnever change. The procedural modeldescribes what the system needs to do, and how to do it. Often referred to as the dynamic part of aninformation systems model, a procedural model has two parts: processing andcontrol.





hybrid. What are twoforms of hybrid technology being adopted?




A. Sequential files and ASCII files


B. RMDS and Oracle


C. Object-relational and extended-relational


D. None of the above







C. Object-relational and extended-relational

What are the core functions of data management?


·

Data program coordination

· Enterprise data integration


· Data stewardship


· Data development


· Data support operations


· Data asset use





Which of the core data management functions isresponsible for the identification, architecting, and modeling of data assetsshared across two or more business areas or enterprise-wide?




A. Data development


B. Data stewardship


C. Enterprise data integration


D. Data program coordination







C. Enterprise data integration

Which of these data managementroles has the largest sphere of influence with regard to theestablishment and enforcement of data management policies?


A. Policy maker

B. Data steward


C. Architect


D. Integrator


A. Policy maker

Describe the five levels of maturity defined bythe Capability Maturity Model (CMMSM)?


1) Initial—processesare informal and ad-hoc and success is dependent on heroes


2) Repeatable—processesare disciplined so that teams can accomplish activities consistently withintheir team environment, but performance may not be consistent across teams.


3) Defined—processesare standardized so that all teams accomplish the same activities the same way


4) Managed—processesare predictable so that teams can accomplish activities within known envelopesof resource and schedule requirements


5. Optimizing—processesare “self-improving” so that teams can continuously identify processimprovements, and mechanisms are in place to implement improvements
Describethe Key Process Areas (KPAs) for data management.

1) Configurationmanagement—process is in place to manage changes in all data managementprocesses and data assets


2) Contractmanagement—data management support is provided to enterprise contractingactivities, to ensure appropriate data-related contract deliverables are put inplace


3) Qualityassurance—process is in place to provide management oversight of the quality ofenterprise data management processes and data assets


4) Projectplanning—process is in place to ensure that proper data management processesand data asset deliverables are incorporated in systems development projectplans


5) Projectoversight—process is in place to provide management tracking of data aspects ofsystems development projects to permit early corrective actions and scheduleadjustments


Which of these roles is common to all the Data Administrationjob descriptions and in particular is a major accountability of the DA manager?


A. Managing the DA function


B. Establishing and enforcingdata standards

C. Maintaining the repository architecture


D. Use of tools for data modeling


B. Establishing and enforcing data standards





Which of the DA jobs is most concerned with long range planningand strategy, establishing/controlling required IS manpower and budget levels?



A. Manager, Data Administration


B. Data Administration Consultant


C. Repository Administrator


D. Data Administration Analyst








A. Manager, Data Administration

Which of the DA jobs is most likely to perform applicationlogical data modeling, establish data definitions and co-ordinate the logicaldevelopment of data?


Data Administration Analyst


Which of the DA jobs is most concerned with security andperformance such as through maintaining security profiles and having approvalover policies and design?


Repository Administrator


What is, and why is “The (Zachman) Framework” important?


Itis a comprehensive, logical structure for descriptive representation (i.e.models, or design artifacts) of any complex object and is neutral with regardto the processes or tools used for producing the descriptions. For this reason, the Framework, as applied toEnterprises, is helpful for sorting out very complex technology and methodologychoices and issues that are significant both to general management and totechnology management



Inwhich Framework cell is the definition of a specific business objective?




A. People, Owner


B. Function,Designer


C. Data, Planner


D. Motivation, Owner (businessplan, end=business objective, means=business strategy)







D. Motivation, Owner (business plan, end=business objective, means=business strategy)

Why is The Framework useful for change management?


TheFramework is helpful for analyzing the options to understand what they are,what the implications are, and to communicate and to have objective dialogueabout what they are.


Why is stewardship important? Specifically, what does it mean for cross-functional information or datawarehouse needs?


Withoutinformation stewardship, it is virtually impossible to foster trust in sharabledatabases

Whichstewardship role is accountable for establishing information policy?


StrategicInformation Steward





Which of these stewardship roles is accountable for the qualityof information produced?




A. Operational InformationSteward


B. Intermediary Steward


C. Business Information Steward


D. Process Steward







A. Operational Information Steward

Which of these stewardship roles is accountable for datadefinition, domain value specification, and business rule specification?


A. Managerial Information Steward


B. Strategic Information Steward


C. Business Information Steward

D. Knowledge Steward


C. Business Information Steward

What is the primary role of the Knowledge Steward?


Accountablefor work outcomes. Also accountable foruse of information, including upholding any policies or regulations governingits use. Knowledge workers who useinformation to perform work are information “consumers” – they use informationto do their jobs. They are knowledgestewards, accountable for their work outcomes. This accountability is the most generally understood and applied. People are accountable for their workoutcomes, regardless of whether they use information as input or not.



What is the source of the data element standards presented inthe text?


A. International Standard (ISO) 11179


B. Data Management Association (DAMA)


C. Insurance Services Office (ISO)


D. American National Standards Institute (ANSI)


A. International Standard (ISO) 11179

The object class term and property class term make up whatlevel of the Data Element Model?


A. Attribute level


B Conceptuallevel


C. Logicallevel


D. Subject area level


B Conceptual level

Whatkind of rule is based on the meaning of name components of data elements?


A. Meta Rules


B Lexical Rules


C. Zachman’sRules


D. Semantic Rules


D. Semantic Rules

What is the biggest impediment to data sharing acrossapplications, across business units, across business functions and acrossorganizations?


A. Lack of an integrated data resource


B. People want their own data


C. Historical lack of technical capability


D. Lack of a global data warehouse
A. Lack of an integrated data resource

What is most needed for true data sharing?


A. Policy setting and enforcement


B. A common data architecture


C. A formal repository product


D. A strong data administration group


B. A common data architecture

What is integrated data resource?


It is a data resource where alldata are formally integrated within a common context and are appropriatelydeployed for maximum support to the business.






What is the difference between “operational” and “evaluational”data?








The first is volatile, the secondis nonvolatile.


Based on its overall structureand physical management, how is data in a common dataarchitecture grouped?


A. Evolutionary stages


B. Data Megatypes


C. Access requirements


D. It isn’t segregated, it is integrated


B. Data Megatypes

What does disparate data result from?


A. Different business needs for the same kindsof facts


B. Different storage methods and technologies


C. Lack of systems integration


D. Lack of awareness and understanding of available data



D. Lack of awareness and understanding of available data


How can data disparity be resolved?


A. A transition process to integrated data


B. Developing all new systems to a commonarchitecture


C. Doing more translations of data


D. Better repository definitions


A. A transition process to integrated data





What does the “virtual data state” describe?




A. An integrated data resource


B. Users not needing to know where data islocated


C. Real-time transformation within a common architecture


D. Design vs. implementation status of data








C. Real-time transformation within a common architecture

What is data resource data?


Any data that are needed tothoroughly understand, formally manage, and fully utilize the data resource tosupport the business information demand


Distinguish between disparate and comparate data.


Disparatedata are data that are essentially not alike, or are distinctly different inkind quality or character, while comparate data are data that are alike in kindquality and character, and are without defect

Another term for data resource data is:


A. Comparatedata


B. Information


C. Metadata


D. Business intelligence


C. Metadata

List the seven principles supporting the concept of dataresource data.


1) Semantic and technical aspects (business andtechnical data resource data)


2) Scope includes all data that are at anorganization’s disposal


3) Must be kept current with the business


4) Must include the correct level of detail, bepresented in an appropriate manner, and be understandable to the intendedaudience


5) Must be nonredundant


6) Must be readily available to all audiences


7) Must be known to exist by the organization


What is the term used to describe data which is referred to or read by abusiness application, but is not updated by that same application?


Reference data


Name and describe the types of reference data tables.


1) Common reference table—lists data elements,codes, and code descriptions


2) Common reference table with multiple attributes—containsmultiple business facts or attributes about an entity


3) Classification reference table—supportscategorization schemes


4) Code translation reference table—totranslate codes of one application to those of another

List at three major guidelines for managing reference data.


1) Centralize control and maintenance of reference tables

2) Managing reference table design and metadata


3) Managing reference data in production


Name and describe the three key areas of security.


1) Software security


Measuresthat can be taken through software or technology in order to secure data. This includes software configuration practices and accesscontrols


2) Information flow management


Flow of information about critical data systems throughemployees andmembers of an organization (not information flowing through)


3) Physical security


Security precautions that are necessary to protectthe actual physical computing infrastructure of an organization, such as computers,networking equipment, etc.


What is a contingency plan and why is it important to data security?


Acontingency plan is security planning that allows organizations to effectivelylimit risks to their data systemswhen security issues arise. Thisincludes delegating responsibility anddecision-making power to individuals who are familiar with the system. This plan includes the identity ofindividuals who can make decisions about solutions to security problems to enssureappropriate resolution and prevention of future problems.


What is the data administration role in data security?


A. Perform backup and recovery


B. Enforce data security policy


C. Maintain lists of access privileges for users


D. Assume insecurity and identify issues



D. Assume insecurity and identify issues


In a purchased package environment, what is therecommended approach for each of the four Guiding Principles?


Guidingprinciple #1: Data Quality


· Provideadequate focus of data quality in the purchased package environment. A Data Quality Council is important to ensuredata quality, strategically plan data design, resolve data quality issues andto provide an overall focus on data quality.


Guidingprinciple #2; Data Integration-eliminating redundancy


· Providefor data integration in a purchased package environment.


· OperationalData Store or Shared Data Area is essential in planning for and integratingdisparate data in operational systems and package environments.


Guidingprinciple #3: Data Design Adaptability; response to change


· Providean adaptable data design and a responsive change process in a purchased packageenvironment. Information modeling is aneffective tool in strategically planning, documenting, and absorbing expectedas well as unexpected change.


Guidingprinciple #4: Data Awareness and accessibility


· Achievedata awareness and accessibility in a purchased package environment. Make plans for a Central Repository tocontain shared Information Assets and to support data awareness andaccessibility.






What tasks would be done by DA in the analysisphase?








1) Gather, document, and clarifybusiness requirements in a business model.


2) Analyze the business model tounderstand data needs and highlight potential share data areas.


3) Plan integration with CorporateData Model, review existing business, logical, and physical models.


4) If there are no existing models,create the level of models required.


5) Analyze data from existing relatedprocesses or applications.


6) Analyze pertinent metadata definedin the data dictionary or repository.


7) Plan Data Questions for RFP.


8) Determine if the data the packageis going to use already exists. If so,where?


9) Determine what data the packagewill be the source of versus what data the package will use.


10) Determine how the package fitswith the long-term business, information, and data strategies.



What tasks would be done by DA in the designphase?


1) Propose strategy for Shared DataAreas and Operation Data Stores, design and model solutions.


2) Design a plan for packageintegration with existing corporate data and plan models to merge.


3) Design a plan for data sharing,data migration, population, and conversion of data.


4) Document a data source to targetcross-reference in the corporate repository.


5) Document transformation andbusiness rules in data dictionary or repository.


6) Document and define metadata indata dictionary or repository.


7) Ensure all appropriate models havebeen created and are accessible.


8) Perform impact analysis; documentdata quality issues.


9) Document data cleansing process;define risk areas and potential solutions.


Decide data accessrequirements, and requirements best handled outside package.

What tasks would be done by DA in the constructand implement phase?


1) Create an Operational Data Store,if one does not already exist, and/or Shared Data Areas.


2) Consult programmers on creatingCommon Modules to load data from Operational Data Store or Shared Data Areas topackage tables, or to tables shared into purchased package environment.


3) Have DBAs create all tables thepackage sees as standard, regardless of whether they will be used. DO NOT delete them. Do not remove any unused columns, as thatwill modify the package.


4) Utilize vendor supplied utilitiesto extend and update table definitions.


5) At the time data is ported to adata warehouse; it is possible to introduce referential integrity as a dataquality check, if desired, to identify potential quality problems (orphan data),giving an opportunity to correct problems before replication to other areas.


6) Instead of extending a standardpackage table, if additional fields are needed, create a one-to-onerelationship to the existing package table and add new tables.


7) When to add columns to an existingtable.


· Thenew columns are generally accessed along with existing columns, thuseliminating the need for joins.


· Thenew data is non-key that fits well with the existing table data.


8) When to add parallel tables.


· Datain columns represent a new object.


· Newdata columns represent data access separate from the existing table accesses.


· Rowlength after additional new columns exceed the standard block size of rowstorage in DBMS i.e., 2K in Sybase.


9) Make sure to model ANYchanges. Changes to original plan or newreleases. Go back through the Analysis,Design, Construct, and Implement Phases. Discourage ad-hoc adds.


10) Do not make changes withoutperforming impact analysis, going through a controlled process to integrate andshare the appropriate data. Alwaysupdate models.


Which of these is a recommended purchased packageevaluation criterion?


A. Does the package data model conform to your enterprise data model?


B. Do the users like the data entry screens?


C. How welldoes the package fit the business requirements?


D. Is there a package users group?


How well does the package fit the business requirements

What are the steps associated with criteriadevelopment of a tool evaluation process?


· Identifyand define the scope.


· Identifyclients.


· Ideally,consider the widest possible range of usage first.


· Identifyproject team.


· Identifywhat products exist to fill the need.


· Usingthe “long list” and high level requirements, determine how similar requirementsare currently being met within the enterprise.


· Interviewclients for their requirements.


· Preparea scoring matrix based on requirements obtained in the interviews.


· Basedon the scoring matrix and your specific business requirements, identify anymandatory items that might be used to narrow down the list of candidateproducts.


· Obtaininformation about each vendor and each product’s functionality and capabilityvia the Internet and any literature that can be found. Select the vendors and products that would beviable candidates to match the criteria.


· Ifa manageable “short list” results from the previous step, continue with theappropriate evaluation method(s) to compare the products. Otherwise, use one or more of the evaluationmethods (demonstrations, RFIs, or customer references) to further refine thelist of candidates.


What types of information would be part of the“company profile” portion of a tool evaluation?


· Lengthof time in business


· D& B rating


· Customerbase


· Marketshare, competitive position


· Strategicalliances


· Financialstability, including profitability, liquidity, and financial leverage


List thethings to consider as part of the “technical capability” portion of a toolevaluation?


1) Scaleable and expandable


2) Specific hardware and softwarerequired and supported


3) Hardware and software supported


4) Highly available, reliable, andfault resilient


5) High-security and high-integrity


6) Distributed management


7) Online and off-line storage


8) Systems management tools,including capacity planning, backup/recovery, and performance measurement tools


9) Integrate with the mainframe andserver environments if required


10) Ability to provide technicalexpertise and services to ongoing projects and initiatives


11) Flexibility=degree ofcustomization required or allowed


12) Ease of installation, softwaredistribution, and maintenance


13) Administration requirements andcapabilities


14) Performance and throughput


15) Compatibility with existingstandards


16) Adequacy and quality ofdocumentation


17) Data models included


18) User interfaces (ease of use, Webenabled, etc.)


19) Applicable quality or standardscompliance/certification


20) Foreign language support, ifrequired


21) Ability to interface or integratewith existing products and environment


22) Total cost of ownership—Cost/benefitratio






Describe the four activities that are part of the“technology strategy” portion of a tool evaluation.












Describevendor’s Research and Development capabilities. Do they anticipate any upgrades to the system in the near future? Please describe. Include information on the dollar investmentand staffing.


Describevendor’s perspective on client/server architectures. Describe the company’s five year vision forthe future directions of its client/server hardware and system softwaretechnologies (indicate time frames for significant capabilities described inyour vision).


How does thevendor keep pace with the changing environments supported by, or required for,the product? What are theinter-dependencies with other products or vendors? Who are the strategic alliances? For example, if a product is dependent on thefacilities of and operating system (or any other product), what are the implicationswhen that product changes?


Describevendor’s perspective for the following areas (please provide availability timeframes by indicating whether the technology is available now or currently inresearch or development).


Hardwareand system software scalability


Highavailability of hardware and system software


Networkconnectivity


Integrationand interoperability for multi-tier, multi-platform environments


Object-orientedtechnology


HostingInternet/Intranet services. Integrationof Internet/Intranet services with multi-tier, multi-platform “back-end”application systems


“Thin-Client—NetworkComputer” desktop


Distributionof application logic and data across a heterogeneous, multi-tier environment


Systemsmanagement


Which of these activities is an active toolevaluation technique?


A. Obtain competitive pricing information


B. Evaluate responses to RFI


C. Perform hands-on evaluation


D. Interviewclients for their requirements


C. Perform hands-on evaluation


What is the main difference between HTML and XML?


A. XMLincorporates metadata


B. HTML is for test and graphics and XML is for structured data


C. XML is an enhancement of HTML


D. XML incorporates Java


A. XML incorporates metadata

Of the three major technology shifts affectingthe Internet in the 1990’s, HTML, Java, and XML, which may not be needed in thefuture and why?


HTML—HypertextMarkup Language—because XML—Extensible Markup Language was its successor.


What does data modeling have to do with thefuture of e-business?


A. Enables understanding of XML and XSL


B. Necessary for database infrastructures fore-business


C. Provides for structured metadata for XML


D. Future e-business technologies will re placedata modeling


C. Provides for structured metadata for XML


What is the scope of data management in theInternet?




A. Perform same data management functions forexpanded enterprise and Internet




B. Promote and manage the use of XML for alle-commerce




C. Work with systems groups on Intranetapplications




D. Set new standards for Internet applications






A. Perform same data management functions for expanded enterprise and Internet

How has the mission of IRM changed because of theInternet?


Theintegration of these technologies will be the crucible of 21st century datamanagement. We have already reaffirmedthat the mission of IRM professionals remains unchanged: to provide theenterprise with understanding of—and controlled access to—its informationresources.


How has the technology of the Internet affectedthe role of IRM?


Increasesthe Importance of Data Access and Data Distribution

How has the Internet affected the management ofmetadata?


Lessemphasis on a Centralized Repository moving toward distributed MetadataSolutions.


In addition to traditional metadata, which ofthese things should IRM be doing differently in the Web-centric enterprise?


A. Include operational metadata with traditional metadata


B. Employ XML as a metadata maintenance facility


C. Set new standards for XML


D. IRM should not change


A. Include operational metadata with traditional metadata

What are the major differencesbetween internal and external memory?


Ourinternal memory is small, fast, and convenient (our brain is always withus—well, most of the time.) Externalmemory is large, slow, and not as convenient

Whatis the difference between transaction processing and decision making?


Transactionprocessing is handling every day business (by processing transactions) anddecision making is planning for the future. Their success, and their organization’s success, depends on the qualityof their decisions.


Whenare data relevant?


Dataare relevant when they pertain directly to the decision and are aggregatedappropriately.



Whatis hypertext? How does it differ fromlinear text?


Whymight hypertext be useful in an organizational memory system?

Hypertext is theelectronic files in which an author can link information and create nonlinearpaths through related material. Ahypertext document has built-in linkages between sections of text that permitthe reader to jump quickly from one part to another. As a result, readers can find data theyrequire more rapidly.


Whatis imaging? What are the characteristicsof applications well-suited for imaging?


Images are visual data:photographs, sketches, and videos. First, images are widely used for identification and security. Second, images are used as evidence. Third, images are used for advertising andpromotional campaigns, and organizations need to maintain records of materialused in these ventures.


Whatis an external memory? Why doorganizations use external memories instead of building internal memories?


External memory isadditional memory that is not contained within a system. Organizations are not limited to their ownmemory stores. There are firms whosebusiness is to store data for resale to other organizations.


Whatis the common name used to refer to systems that help organizations rememberknowledge?


Data Management.


Whatis a DSS? What is its role inorganizational memory?


Organizationsbuild mathematical models to describe their business. These models, usually placed in the broadercategory of decision support systems (DSS),are then used to analyze existing problems and forecast future businessconditions. A mathematical model canoften produce substantial benefits.






What component of organizational memory isdescribed as the linchpin?




A. Knowledge


B. Model


C. People


D. Social network








C. People

What is the most important aspect oforganizational memory?


A. Decisions


B. People


C. Knowledge


D. Computers


B. People

There are various problems with organizationalmemory. Which of the six listed in thisassignment best describes a company with ten different and unconnectedsystems?


A. Redundancy


B. Interface


C. Lack of reality


D. Lack ofdata integration


D. Lack of data integration

Whatis the difference between soft and hard information?


Information hardness is asubjective measure of the accuracy and reliability of an item ofinformation. Market information is thehardest because it is measured extremely accurately. There is no ambiguity about its meaning, andits measurement is highly reliable. Incontrast, the softest information, which comes from unidentified sources, isrife with uncertainty.


Whatis the difference between rich and lean information exchange?


Information richnessdescribes the concept that information can be rich or lean depending on theinformation delivery medium. Informationis richest when delivered face-to-face. Information is lean when delivered as a numeric document.


Whatis benchmarking? When might a businessuse benchmarking?


Benchmarking establishesgoals based on best industry practices. Organizations need information to identify feasible, motivating, andchallenging goals. Once these goals havebeen established, organizations need information on the extent to which thesegoals have been attained.


Ifyou had just failed your database exam, would you use rich or lean media totell a parent or spouse about the result?


You would use rich media andtell them face-to-face.


Whatis gap information?


Gap information is theinformation that reveals a gap between desired and actual performance.


With regard to the information characteristics ofrichness and hardness, what best describes a rumor that a coworker tells you ina face-to-face conversation?


A. Hard and lean


B. Soft andrich


C. Hard and rich


D. Soft and lean



B. Soft and rich


Which of the following is not a type ofinformation associated with organizational change?


A. Goal setting


B. Gap


C. Socialmemory


D. Change


C. Social memory

Problem identification looks for differencesbetween expected and present performance. Which of the following is a method inidentifying a problem?


A. Establish goals based on best industry practices.


B. Produceexception reports only when a difference arises.


C. Track the number of computer users.


D. Continuously review the data dictionary.


B. Produce exception reports only when a difference arises.

What isinformation satisficing?


Mangers accept the first satisfactory decision theydiscover. They also satisfice in theirinformation search, collecting only enough information to make a satisfactorydecision. Ultimately, informationsatisficing leads to lower-quality decision making.


Give some examples of commoninformation delivery systems


Information deliverysystems are; verbal exchange, voice mail, electronic mail, written report,meeting, groupware, management information system, Web, image processingsystem, computer-aided design, geographic information system, decision supportsystem, and expert system.


Who uses an EIS?


EIS stands for executive information system.


As the name implies, EIS has been developed forexecutives. These systems are very easyto use and are a way to integrate information from multiple sources. A major feature of EIS is that each singleEIS is custom-made for one particular executive’s requirement and continuouslyupdated and changed to adapt to the executive’s changing requirements

What is groupware?


Groupware is a general term applied to a range ofsoftware systems designed to improve work. For example, groupware might facilitate document exchange orbrainstorming.



What is an identifier? Why does a data model have an identifier?


Identifier—an attribute or collection of attributesthat uniquely identify an instance of an entity is called an identifier. An entity in the model must have a uniqueidentifier because when the model is converted to a relational database theentity becomes a table and the identifier becomes the primary key.


What are entities?


Entities are something in the realworld that are represented in a data model and about which data must bestored. An entity is the basic buildingblock of a data model.


Which of the following best describes StructuredQuery Language (SQL)?


A. A data mapping language and a data domain language


B. A data description language and a data mining language


C. A datadefinition language and a data manipulation language


D. A data model language and a data definition language


C. A data definition language and a data manipulation language

Whatis the entity integrity rule?


AnEntity Integrity Rule simply means every row must have a unique, non-nullprimary key.


Which of the following are SQL commands?


A. DATA and DEFINITION


B. COUNT andORDER BY


C. SUMTOTAL and MAXMIN


D. RUN and STOP


B. COUNT and ORDER BY

What is the referential integrityconstraint? Why should it be enforced?


The referential integrityconstraint is the requirement that a foreign key cannot be defined unless itscorresponding primary key exists. Thereferential integrity constraint should be reinforced because it maintains theaccuracy of a database.



What does the SQL command JOIN do?




A. Appends one table to the end of another


B. Allows two tables to be linked on common rows


C. Creates anew table from two existing tables using a column common to both tables


D. Allows for nested queries






C. Creates a new table from two existing tables using a column common to both tables

What is a view?


A. A virtual query


B. The visual output of a query


C. A virtualtable


D. Display of SQL code


C. A virtual table

Which of the following is a characteristic of aSQL query view?


A. A view cannot be queried


B. A view physically stores data for later use


C. A view can only use existing columns and cannot perform anycalculations


D. A viewcontains no actual data


D. A view contains no actual data

Why do you have to create a thirdentity when you have a many-to-many relationship?


· Whenwe have a many-to-many relationship, we create a third entity to link theentities through one-to-many relationships. The third entity, called an associative entity, stores data about therelationship.


What does a plus sign near arelationship arc mean?


· Theplus sign provides information about the identifier. It identifies a weak entity’s dependence onanother entity for its existence and identification.


Howdoes EXISTS differ from other clauses in an SQL statement?


· EXISTSrepresents the existential quantifier of formal logic. It is used in a WHERE clause to test whethera table contains at least one row satisfying a specified condition.


How is a many-to-many relationship represented?


A. As three one-to-many relationships linked toa third entity


B. As two one-to-one relationships


C. As two recursive one-to-many relationships


D. As two one-to-many relationships linked to a third entity


D. As two one-to-many relationships linked to a third entity

Which of the following is NOT an SQL command?


A. CREATE


B. ORDER BY


C. FORALL


D. GROUP BY


C. FORALL

Mapping a one-to-many recursiverelationship is similar to mapping a standard one-to-many relationship,with the addition of the following:


A. A column for a composite key is added to theone end of the relationship


B. A column for the foreign key is added to theone end of the relationship


C. A column for the foreign key is added to the many end of therelationship


D. A not null constraint is placed on the foreignkey of the many end of the relationship


C. A column for the foreign key is added to the many end of the relationship

In mapping a one-to-many recursive relationship,which situation best describes a deadly embrace?


A. A foreign key constraint becomes the primarykey of the many end of the relationship


B. Two foreign key constraints compete for the same resource


C. A query that joins a table to itself bycreating two copies of the same table


D. One entity owns another entity, but other entitiesown that entity as well


B. Two foreign key constraints compete for the same resource

Indefining foreign keys, what has to be done with regard to null constraints?


A. Foreign keys are allowed to be null


B. Foreign keys cannot be null


C. Foreign keys are only allowed to be null onone-to-many relationships


D. Foreign keys cannot be null on recursiverelationships


A. Foreign keys are allowed to be null

In querying a recursive relationship, howdo you distinguish between the two copies of the same table?


A. There is no need to distinguish


B. By completely redefining each attribute witha new name


C. Create a table alias in SQL by adding a suffix to the table name


D. Create a virtual table with a different name



C. Create a table alias in SQL by adding a suffix to the table name

How is amany-to-many recursive relationship different from a many-to-manyrelationship?


A. A many-to-many recursive relationship doesnot have an associative entity


B. Only a many-to-many relationship is composedof two one-to-many relationships


C. In a many-to-many recursive relationship, asecond associative entity is used


D. None of the above.


D. None of the above.

What are three goals of maintaining organizational memoryintegrity?


Protectingexistence, Maintaining quality, & Ensuring confidentiality

What strategies are available for maintaining dataintegrity?


Legal, Administrative & Technical.


What mechanisms should a DBMS provide to support backup andrecovery of a database?


Backup facilities that create duplicate copies of thedatabase.


Journaling facilities which provide backup copies or anaudit trail of transactions and/or database changes.


A recovery facility within the DBMS to restore the databaseto a consistent state and restart the processing of transactions.


What is the difference between a “before image” and “afterimage”?


A copy of the retrieved record is logged to the journalfile. This copy is referred to as thebefore image because it is a copy of the database record before the transactionchanges it.


A copy of the updated record is written to the journal. This copy is referred to as the after imagebecause it is a copy of the database record after the transaction has updatedit.


How do backward recovery and forward recovery differ?


Backward recovery is used to back out or undo unwantedchanges to the database.


Forward recovery involves re-creating a database using aprior database state.



When would you use ROLLBACK in an application program?


ROLLBACKis used to back out or undo unwanted changes to the database.

When would you use COMMIT in an application program?


COMMIT is an SQL command to make a set of database changespermanent.


Give three examples of data integrity constraints.


Type, Size, Values, Range, Pattern, Procedure, Conditional,Not Null, and Unique.


What is the purpose of locking?

Allocatinga particular database resource to a transaction or user.


Whatis the likely effect on performance between locking at a row compared tolocking at a page?


Lockingat the row level allows other users to access other rows in the file while thelocked row is being used. Locking at thepage level locks all users out from being able to obtain access to any of therecords that are included on the page of the record that is being updated. There is more resource conflict when lockingat the page level than when locking at the record level. Locking at the record level also increases theprocessing overhead beyond what is necessary for locking at the page level.


Whatare three types of authenticating mechanisms?


Somethinga person knows – remembered information. Example: Name, account #, password


Somethinga person has – possessed objects. Example: Badge, plastic card, key


Something the personis – personal characteristics. Example: Fingerprint, voiceprint, signature,hand size

Whatis encryption?


Encryptiontechniques complement access control. Encryptioncan be used to obscure or hide the meaning of data. Encrypted data cannot be read by an intruderunless that person knows the method of encryption and the key. Encryption is any transformation applied todata that makes it difficult to extract meaning. To implement it, you need an encryptingtechnique to transform data to cipher text, and a decryption technique toreconstruct the original data from cipher

Whatare the advantages of public key encryption?


Theadvantage of using public key encryption is that it is easier to distribute thekeys, because the public key can be distributed to anyone and only the holderof the private key can read it. Thus theprivate key does not need to be distributed eliminating the problem ofdistributing the sensitive keys.


“If a transaction has two or more discrete piecesof information, either all of the pieces are committed or none are"describes which attribute?


A. Atomicity


B. Consistency


C. Isolation


D. Durability


A. Atomicity

Which of the following is true about theconcurrent update control mechanism of locking?


A. Locking prevents deadly embrace.


B. Locking at the record level requires less processing overhead thanlocking on page level.


C. Data arelocked from the time the update transaction is initiated until it is completed.


D. Locking occurs on all transactions from beginning to end.


C. Data are locked from the time the update transaction is initiated until it is completed.

What strategy of the database integrity goal ofprotecting existence best describes a company that physically stores the copyof the database in a guarded vault-like room?


A. Backup and recovery


B. Lockout


C. Isolation


D. Restricted access


C. Isolation

Which of the following are three hallmarks of ahealthy information ecosystem?


A. Best-of-breed, open architecture, relational


B. Interchangeable, portable, transparent


C. Adaptability,change, balance


D. Metadata, parallel processing, secure


C. Adaptability, change, balance

State three business pressures fueling theevolution of the information ecosystem.


.


Three fundamental business pressures are fueling the evolution of the information ecosystem: growing consumer demand, increased competition and complexity, and continued demands for improvements in operating efficiencies





Which component of a corporateinformation ecosystem is described as the family of systems from which the CIF gathers its raw detaildata?




A. External world


B. Applications


C. Operational data store


D. Data mart








B. Applications

Statethree roles of reference data.


Referencedata fulfills the following roles:


- It allows a corporation tostandardize on a commonly used name for important and frequently usedinformation, such as product, country, organization, customer segment, and soforth.


- It allows commonly used names tobe stored and accessed in a short-hand fashion, which saves disk space.


- It provides the basis forconsistent interpretation of corporate data across departments.


Stateand explain three implications of historical data.

Theimplications of historical data are many, including:


Volumeof data: The longer the history is kept,the greater the amount of data.


Businessusefulness: The more current a unit ofinformation, the greater the likelihood that it is relevant to currentbusiness.


Aggregationof data: The more current the data, thegreater the chance that the data will be used at the detailed level. The older the data, the greater the chancethat the data will be used at the summary level.


Describe the standard flow of data through theCIF.


Thestandard flow of data throughout the CIF is from left to right, that is, fromthe consumer to the application, from the application to the I & T layer,from the I & T layer to the ODS or the data warehouse, from the ODS to thedata warehouse, and from the data warehouse to the data marts. The flow occurs as described in a regular andnormal manner.


There is a clear delineation between operationalprocessing and DSS/informationalprocessing. Which statement below bestdescribes the difference between the two?


A. The ODS resides completely in operational processing.


B. Applications reside in the DSS.


C. Data martsand data warehouses are completely in the DSS.


D. Data marts reside in the operational processing.


C. Data marts and data warehouses are completely in the DSS.

DSS/informationusers analyze data differently from operational users. What does it mean when a DSS/information user looks at data “heuristically”?


A. The DSS/informationuser reviews data on an hourly basis.


B. The DSS/information user next step of analysis isdeeply dependent on the previous analysis.


C. The DSS/informationuser’s questions and queries are preformatted.


D. The DSS/informationuser reconciles detail data to summary data, so as to keep the analysis whole.


B. The DSS/information user next step of analysis is deeply dependent on the previous analysis.

Nameand describe the four most common types of DSSusers.

Tourists—arethose DSS analysts who specializein being able to find a breadth of information. A tourist is seen as an individual who uses the Internet/Intranet andknows where to find many things. Atourist understands the structure of the CIF and knows where in the structureof things to find almost anything. However, the tourist is an unpredictable analyst, sort of a walkingdirectory of information.



Farmers—Verydifferent from a tourist. A farmer issomeone who is predictable and knows what he or she wants before setting out todo a query. A farmer looks at smallamounts of data because the farmer knows where to find the data. The farmer is somewhat repetitive in thesearch for information and seldom wanders far from data that is familiar. The farmer operates as comfortably on detaileddata as on summary data. In manyregards, because summary data is compact and concise, summary data suits theneeds of the farmer quite nicely. Inaddition, the data the farmer is looking for is almost always here.



Explorers—Havesome traits similar to both the tourist and the farmer but are unique untothemselves. The explorer is someone whooperates with a great degree of unpredictability and irregularity and looksover massive amounts of detail. Theexplorer seldom has much use for summary data and frequently makes requeststhat seem to be farfetched. Often timesthe explorer finds nothing, but occasionally the explorer finds huge nuggets inthe most unexpected places. The explorerbecomes an expert in one arena within the CIF.



Miners—Havea great affinity to the explorer, and they form a symbiotic relationship. The explorer creates assertions andhypotheses. The miner proves thevalidity or invalidity of those assertions and hypotheses. The miner is a statistician. The miner begins by testing one or morehypotheses against a large body of data, usually transaction data. The miner then comes up with a statisticallybased opinion about the strength of the hypotheses. These newly discovered hypotheses are thenreported back to the explorer for further examination.


An important issue to the supporting CIFarchitecture is whether the components are centralized or distributed. How is the operational data store (ODS)classified in terms of being centralized or distributed?


A. The ODS is almost always distributed


B. Large ODS are centralized and small ODS are distributed


C. The ODS is both distributed and centralized


D. The ODS isalmost always centralized


D. The ODS is almost always centralized

Describe the five steps in a typical progressionto the building of the CIF. What are theadvantages of the suggested migration?


OnDay 1—is achaotic information systems environment without shape or form.



OnDay 2—the datawarehouse begins to emerge and grows incrementally. With each advance in the data warehouse, datais removed and integrated from the amorphous information systems environment.



OnDay 3—data martsstart to grow from the data warehouse. Indirectly, more processing and data is removed from the informationsystems environment as different departments begin to rely on their data martsfor DSS processing.



OnDay 4—Integratedapplications start to appear. Theintegrated applications require an integration and transformation layer inorder to feed the data to the data warehouse. The emergence of the integratedapplications comes slowly and, in many cases, imperceptibly.



OnDay 5—the ODS isbuilt. The ODS is fed from theintegration and transformation layer and, in turn, feeds its data to the datawarehouse. By this time, the systemsthat were once known as the production systems environment have almostdisappeared. The legacy environment isonly a very small vestige of the former invincible self.


Advantagesof the suggested migration:


Proven


Leastrisky


Fastest


Avoidsmany pitfalls


Least expensive withthe greatest probability of success.

What best describes the relationship between theCIF and the external world?


A. The external world feeds all external world data into the CIF.


B. The CIF feeds all of its data into the external world.


C. The external world and CIF both feed applications.


D. The externalworld feeds the CIF and consumes the information produced by the CIF.


D. The external world feeds the CIF and consumes the information produced by the CIF.

State four responsibilities of the applicationscomponent of CIF.



1) Gathering detailed transaction data


2) Interacting directly with the end user


3) Auditing and adjusting data


4) Editing data


Why are applications unintegrated? How does this lack of integration surface?


Theapplications are unintegrated for a variety of reasons:


Theapplications were built to suit the needs of one group, then another.


Applicationswere required as part of a corporate merger.


Applicationswere first built-in house and then augmented by third-party software packages.


Thecost justification process applied to the development of applications did notallow for anything other than an immediate and obvious set of requirements tobe addressed, thereby limiting the extensibility and rescue of the applicationsolution.



Thislack of integration of applications surfaces in many ways, such as:


Inconsistentkey structures


Inconsistentencoding structures


Inconsistentstructuring of data


Inconsistentreference structures of data


Inconsistentdefinitions of data


Inconsistentcode and calculations


Inconsistentreporting


What is an important architectural component ofthe applications environment?


Thesystem of record. This resulting sourceof data is captured by the I & T layer, transformed, and loaded into thedata warehouse and/or ODS.


How does the integration and transformation (I& T) layer differ from the ODS, data warehouse, and data marts with respectto makeup.


A. The I & T layer contains all the hardware


B. The I& T layer is primarily made up of programs, not data


C. The ODS, data warehouse and data mart are primarily made up ofsoftware


D. The ODS, data warehouse and data mart are primarily software based


B. The I& T layer is primarily made up of programs, not data

Where do feeds out of the I & T layer go?


A. End users


B. Data applications


C. Into theODS and data warehouse


D. External world


C. Into the ODS and data warehouse

State five functions that I & T programs cando.


I& T programs do one of the following functions:



1) Merely read data from one database and passit to another program.


2) Do transformations that standardize datausing a common set of encoding, derivation, formatting, and substitution rules.


3) Map the transformed data to the correctlocation in the data warehouse and/or ODS.


4) Produce intermediary files that are then usedas input into other programs.


5) If more than one input source exists, theycan produce more than one file as output.


Describe the role of the logical data model.


Thelogical data model acts like a blueprint that describes how data should look inthe corporate information factory. Fromthese specifications, the builder creates I & T programs that transform rawmaterials provided by the applications environment into the foundation, frame,roof, siding, and interior that make up the CIF. The logical data model intellectually unifiesthe work that is done by the many programs that go into the I & T layer.





Which are NOT parts of the seven kinds of processingthat occur in the I & T interface?




A. Summarizingdata and data archiving


B. Performing key transformations and encoding structures


C. Simple reformatting and mathematical conversion


D. Resequencing data and assigning default values










A. Summarizing data and data archiving

Describe the five attributes of the ODS.


1) Subject-oriented—organized along the lines ofthe major entities of the corporation


2) Integrated—refers to the physical unificationand cohesiveness of the data as it is stored


3) Volatile—means an ODS can be updated as anormal part of processing


4) Current-valued—timeliness of the data—An ODStypically contains daily, weekly, or maybe even monthly data


5) Detailed—ODS contains detailed data only


What is both a feed into and out of the ODS?


A. The datawarehouse


B. Applications


C. The external world


D. The data marts


A. The data warehouse

Describe the four different I & T interfacesto the ODS.


Fourdifferent I & T interfaces:


1) ClassI: Asynchronous—one-to-two second delay


2) ClassII: Store and forward—two-to-four-hour delay


3) ClassIII: Batch Processing—overnight


4) ClassIV: Data from the warehouse.


Which are ALLfour types of processing that are done in the ODS?


A. Load, summary, detail, operational


B. Load,update, access, DSS analysis


C. Lead, entry, analysis, archiving


D. Entry, record, store, retrieval


B. Load, update, access, DSS analysis

Describe five attributes of the data warehouse.


Thefive attributes of the data warehouse:


1) Subject-oriented—organized along the lines ofthe major entities of the corporation


2) Integrated—refers to the physical unificationand cohesiveness of the data as it is stored in the warehouse


3) Time-variant—any record in the data warehouseenvironment is accurate relative to some moment in time


4) Nonvolatile—refers to the fact that update (inits purest sense—that of finding a record and making changes to the record)does not normally occur in a data warehouse. If update occurs at all, it occurs on an exception basis.


5) Comprised of both summary and detailed data—adata warehouse contains both detailed and summary data.



There are various feeds into andout from the data warehouse. What feed is characterized by beingvery heavy, at night or as needed, mass load, and adds replaces orincrementally updates existing data?


A. ODS


B. The I& T layer


C. Alternative storage


D. Data marts


B. The I& T layer


Discuss the five kinds of processing done in thedata warehouse.



1) Loads from the ODS and the I & T layer into the data warehouse


2) Processes to perform post-load aggregations and derivations (e.g. scoring & segmentation)


3) Utilities required to maintain and operate the data warehouse


4) Unload and restructure processes to create data marts and other architectural entities


5) Some query processing from the DSS analyst community.






State three advantages of data marts asaugmentations to the data warehouse.








1) Control—adepartment can completely control the data and processing that occurs inside adata mart.


2) Cost—becausethe department wants to analyze only a subset of data found in the datawarehouse, the cost of storage and processing is substantially less when thedepartment moves the desired data off to a departmental machine.


3) Customization—asdata passes into the data mart from the data warehouse, the data is customizedto suit the peculiar needs of the department. The data from the warehouse can:


Have itskeys restructured


Beresequenced


Be mergedand pruned


Besummarized


Be editedand converted






There are three popular kinds of data marts, ofwhich two types were discussed in detail. What are they?




A. Multi-dimensionalonline analytical processing (OLAP) and relational OLAP


B. OLAP and star join schema


C. Real-time OLAP and mass OLAP


D. Inline analytical processing and multi-dimensional databases









A. Multi-dimensional online analytical processing (OLAP) and relational OLAP

What are two basic kinds of processing found inthe data mart environment? Who are theytypically done by (tourists, farmers, explorers, miners)?


1) RepetitiveProcessing—done by farmers.


2) UnpredictableProcessing—done by explorers.


The third phase in the evolution in the creationof exploration and data mining warehouses recognizes what?


A. Exploration warehouses feed from data mining warehouses


B. The exploration and data mining warehouses are identical


C. The data mining warehouse becomes the exploration warehouse


D. The twoneed separation but are tightly coupled


D. The two need separation but are tightly coupled

What three sources feed the explorationwarehouse?


1) ExternalData


2) TheData Warehouse


3) AlternativeStorage


What determines the need for the explorationwarehouse?


Somecompanies need an exploration warehouse more than others. The need of a corporation depends entirely onhow many long-running queries they execute

State three reasons why data grows dormant in adata warehouse.


1) Overestimationof the need for historical data. Whenthe warehouse is first designed, the data demand is for five years ofhistorical. After the designer deliversfive years of history, the user learns that for most processing only one or twoyears of history are needed.


2) Inclusionof data that is never needed for analysis. The data warehouse is designed to handle one sort of analysis that neverbears fruit. As a consequence certaintypes of data are simply never accessed.


3) Creationof summary data that is used only once. It is very common for summary data to be placed in the warehouse. Unfortunately, few plan for managing thesesummary tables. As a result, the DWAdoesn’t know what summary tables to remove and plays it safe by not removingany of them.


What are the three factors for using alternativestorage?


A. Size, availability, software


B. Volume, technology, type of analysis performed


C. Cost,optimizing performance, level of granularity


D. Number of users, query length, years of data involved


C. Cost, optimizing performance, level of granularity

List the six purposes of the communicationsfabric of the internet/intranet.


1) Transport data


2) Distributeprocessing


3) Scheduleand coordinate activities


4) Deliverstatus within the architecture


5) Providearchitectural connectivity


6) ExposeCIF capabilities to the external world


Describethe seven factors that govern communication between different components of theCIF.

1) Thefirst consideration is the volume of data that can be passed through thecommunications fabric.


2) Thesecond consideration is the speed with which data will pass through theintranet.


3) Capacityof the Network—when the rate of data flow and the volume of data are in tandemwith each other, the result is the capacity of the network.


4) Modeof Transport—Some communications are of a bulk type and other transmissions areof a burst type. A bulk type oftransmission is one where large amounts of data are transmitted all atonce. The burst kind of transmission isfundamentally different; in this type, many short transmissions are made.


5) Costof Telecommunication Lines—the cost of telecommunication lines is a function ofcapacity and line type.


6) Natureof the Transport—Some transport technologies are very effective at transmittingbulk amounts of data but are relatively expensive, difficult to set up, anddifficult to maintain.


7) Availabilityof the Fabric—a final concern of the architect is the hours of availability ofthe communications fabric. All of theissues must be taken into account by the architect who is in charge of weavingtogether the different components of the CIF.



Which of the following explains why metadata isso important?


A. It is important for gathering raw data


B. Historical data is useful in decision making


C. Mitigates the costs of warehousing


D. It is theglue that holds the architecture together



D. It is the glue that holds the architecture together

What does the text consider the most importantcomponent of the CIF from the standpoint of cohesiveness and continuity ofstructure across the many different components?


Withoutmetadata, the different components of the CIF are merely standalone structureswith no relationship to any other structure. It is metadata that gives the different structures—components of thearchitecture—an overall cohesiveness. Through metadata, one component of the architecture is able to interpretand make sense of what another component is trying to communicate

Give examples for both shareable and autonomousmetadata.


Thefollowing are examples of sharable data:


Thetable name and attributes shared among applications and the data warehouse


Somedefinitions of data shared among the enterprise data model, the data warehouse,and the data mart


Physicalattributes shared among the applications and the ODS


Physicalattributes shared from one application to another


Descriptionof how shared data is transformed as it moves through the integration andtransformation (I & T) layer


Ultimately,very commonly used metadata needs to be shareable.



An example ofautonomous metadata might be the indexes a table has for its use in anapplication

State six advantages of producing metadata as aby-product of the creation code.


1) Metadata creation does not requireanother budgetary line item: it comes automatically


2) Updatingmetadata as changes are made is not a problem


3) Metadataversions are created every time a new version of code is created


4) Programmersdo not know that they are creating metadata


5) Programmersthink they are building systems. Thecreation of the metadata comes spontaneously, unknown to the programmer


6) Thelogic of transformation can be trapped. The transformation tool can understand exactly what conversion andreformatting logic is occurring.


In which of the following places in the CIF ismeta-process information least useful?


A. Theexternal world


B. At the I&T layer


C. Within the applications


D. As data passes to the data mart from the data warehouse


A. The external world

Which of the following is not a characteristic of an enterprise repository?


A. Contains metadata


B. Acts as aDBMS


C. Stores information in a database


D. Provides extensibility


B. Acts as a DBMS

What should a repository strategy consider?


Thefunctions the repository is expected to perform


Theculture of the organization


Thesoftware development methodology, if any


Thenumber and skill levels of persons needed to support the repository


Thelevel of training needed


Thehardware and software environment


Howto market the repository within the organization


Howto research and select a repository tool


Theorganization’s procurement procedures


Theinitial repository project


Highlevel implementation/rollout approach



Which of the following is not anadvantage of purchasing tools instead of developing in-house tools?


A. Designedto meet the company’s requirements


B. Ongoing support for the product


C. Upgrades to meet customers requests


D. Enhancements to support new technology or the remain competitive


A. Designed to meet the company’s requirements

The most difficult challenge in implementing an enterpriserepository is which of the following?


A. Determining the intended use of the repository


B. The transformation in behavior that the organization expects whenpersons or groups begin to share data


C. Identifying the roles of persons involved in supporting and usingthe repository


D. Defining the role of data steward


B. The transformation in behavior that the organization expects when persons or groups begin to share data

What is the ultimate goal of a CIF?


Toget the right information into the right people’s hands when they need it.

What can the data warehouse provide data martswith?


Datawarehouse provides data marts with integrated data that can be used to givedata more “depth” that is otherwise not possible.


Why is historical data important to the CRM environment?


Historicaldata is very important in predicting the future. The reason why historical data is so usefulin predicting the future is that customers (both individuals as well asbusinesses and governments) are creatures of habit.


Describe the typical nature of departmental datamarts.


DepartmentalData Mart—Typical Nature:


Broad,generic focus


Generalanalyses and reports, some ad hoc reports


Unstructured


Unpredictable


Singledepartment or division


What three questions need to beanswered in order to determine which type of data mart is appropriate for a situation?


Whatdoes it do, who is it for, and who is paying for it?


Which of the following does not describe thetypical nature of a DSSapplication data mart?


A. Highly focused


B. Standard analysis and repetitive reporting


C. Highly structured


D. Unpredictable


D. Unpredictable

Which of the following is NOT an advantage of adepartmental data mart?


A. You have a good chance of delivering what the department wants.


B. You can get good funding since the department owns this mart.


C. Most IT projects are founded this way, so it is easy for thedepartment to build a business case


D. There is adesire for supporting an enterprise view of the information.


D. There is a desire for supporting an enterprise view of the information.

What are some of the ways that data can berestructured to meet the needs of business intelligence?





Mergingor aggregating the data, summarizing the data, cubing the data, and statisticalsubsets of data.







What type of reporting is typically done by a DSS analysis application?


A. Key performance monitoring


B. Checkpoint monitoring


C. Exception reporting


D. All of theabove


D. All of the above

Which of the following is NOT a data martcharacteristic?


A. Customized data


B. Summarized data


C. Muchhistory


D. Efficient to access


C. Muchhistory


What are the characteristics of the datawarehouse?



1) Large volumes of data


2) Detailed


3) Much history


4) Integrated corporate view of information


5) Inefficient to access


If M represents the number of applicationsand N represents the number of data marts, which of the followingdescribes how many interfaces are required if the data marts are built first?


A. M + N


B. M – N


C. M x N


D. M / N


C. M x N

If M represents the number of applications and Nrepresents the number of data marts, which of the following describes how manyinterfaces are required when the data warehouse is built in conjunction withthe data mart?


A. M + N


B. M – N


C. M x N


D. M / N


A. M + N

Why is it a bad idea to build the data martsdirectly form the application environment?


Onereason is the complexity of interfaces between the different environments. Another reason is because of the dilemmacaused by deciding where to place common and unique data.


List the advantages when OLTP transactions andanalytical transactions are separated.


Systemblock sizes can be optimized for one type of transaction or the other


Bufferscan be optimized for one type of processing or the other


Systeminitialization parameters, such as FREESPACE, can be optimized for one type ofactivity or the other


Datacan be distributed across system resources (central processing unit [CPU],disk, and so on) for one type of processing or the other


It is a violation of the CIF design to build theODS and the data warehouse as a single structure. What are some of the problems that mightoccur if they are the same structure?


OLTPis freely mixed with analytical transactions


Theworkload is mixed


Analyticusers are mixed with clerical users


Mixedtransmission types are forced into the same communications link


Currentdata is mixed with historical data.






The data warehouse and data marts deliverintegrated data to support business intelligence capabilities. Some of these capabilities support strategicopportunities. Which of the following isNOT a role of the data warehouse or data mart?




A. Profitability analysis




B. Customer segmentation and scoring




C. Product pricing




D. Contractmanagement








D. Contract management


List the two basic types of developmentlifecycles.


1) Systemsdevelopment lifecycle (SDLC)


2) CLDS—reverseof SDLC, i.e., lifecycle development systems


A DBMS can be configured in many different waysto meet peculiar needs of the environment that it is cast in. Which is the correct statement?


A. Checkpoints can be altered


B. FREESPACEcan be modified


C. Buffers can be governed


D. Processing can be partitioned


B. FREESPACE can be modified

Describethe three types of hardware architectures and where they are usually used

1) ParallelMPP architectures: Multiple units of data are tied together by a common“backbone”. ODS environment has aparticularly strong affinity for this architecture.


2) ParallelSMP architectures: Multipleprocessors are tied together in a shared memory configuration. Applications environment uses this type ofarchitecture.


3) Uniprocessorarchitectures: A single storage device is controlled by a single processor,much as in a workstation on a mainframe processor. This type of architecture is sufficient forsmaller amounts of processing.









What are some of the things vital to the ongoingmanagement of the Integration and Transformation layer?








Themaintenance of the code created for the I & T layer


Theefficiency of execution of the code inside the I & T layer


Thecreation of metadata as a code by-product inside the I & T layer


Thecreation of process and procedures to audit the I & T layer


The ODS requires a mixed environment. Which of the following least describesactivities supported by the ODS environment?


A. High availability


B. One-to-two second transaction response times


C. Complex DDS queries


D. Dataquality


D. Data quality

Describe some management concerns of a datawarehouse.


Theprimary issue of ongoing data warehouse success is the management of the datavolume that arises in it. Truly enormousamounts of data tend to accumulate in the data warehouse. In response, the DWA needs to make sure thatthe volumes of data that reside in the data warehouse belong there.


Thesecond aspect of data warehousing that needs to be managed over time is that ofthe quality of data within the data warehouse in terms of completeness andaccuracy.


Which of the following least describes thechallenges of administration of a data mart?


A. Responsetime


B. Building and maintaining the infrastructure


C. Capacity planning as data volumes grow


D. Performance tuning as end-user demand grow


A. Response time

What is the function of a data monitor?


Adata monitor looks at such things as growth and quality of data.


Which of the following is a function of a DSS monitor?


A. Manage transaction response time


B. Identifydormant data


C. Track general activity


D. Monitors growth and quality of data


B. Identify dormant data


What is the function of a network monitor?


Similarto OLTP monitors, network monitors keep track of general network activity.


Which of the following is a function of an OLTPmonitor?


A. Managetransaction response time


B. Identify dormant data


C. Track general activity


D. Monitors growth and quality of data



A. Manage transaction response time