BUS 391 Exam 2 Multiple Choice

¡Supera tus tareas y exámenes ahora con Quizwiz!

All the following are characteristics of native applications EXCEPT __________. A.distributed via a company store web site (such as iTunes) B.developed in complex, sophisticated programming languages C.runs seamlessly on any device under the browser D.developed by skilled professional programmers E.high development cost

C.runs seamlessly on any device under the browser

The process of normalization constructs tables such that every table has a ________. A. one-to-one relationship between entities B.minimized metadata footprint C.single theme D.foreign key E.specialized graphical query

C.single theme

In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required. A.triangular block B.arrow C.vertical bar D.wave E.small oval

C.vertical bar

A DBMS and database are synonymous terms that can be used interchangeably. True False

False

A computer with two CPUs is called a(n) dual-core computer. True False

False

Cache memory is also called "the brain" of a computer. True False

False

Database design is easy and can be explained in a paragraph. True False

False

Managing the impact of database structural changes on applications and users is an operational task for a database administrator. True False

False

Most traditional databases use the Internet to transmit traffic back and forth between the users' computers and the DBMS server. True False

False

The accuracy of a database design is not dependent on the corresponding data model. True False

False

Web applications are programs that are written to use a particular operating system. True False

False

A (bring your own device) BYOD policy is a statement concerning employees' permissions and responsibilities when they use their own device for organizational business. True False

True

A line in an entity-relationship (E-R) diagram is used to represent the relationships between two entities. True False

True

An operating system is a program that controls a computer's resources. True False

True

Databases that have both primary and foreign keys are called relational databases. True False

True

In the future, your house will be so smart it will analyze you. True False

True

It is to the users advantage to have a working knowledge of database developments. True False

True

Locking must be used to coordinate the activities of users in order to prevent the lost-update problem. True False

True

Native applications are developed by professional programmers only. True False

True

One of the functions of a DBMS is to provide tools to assist in the administration of a database. True False

True

Open source succeeds because of collaboration. True False

True

Reports refer to the structured presentation of data using sorting, grouping, filtering, and other operations. True False

True

SQL is an international standard language for processing a database. True False

True

Some governments are launching their own cryptocurrencies. True False

True

The main memory of a computer is also called random access memory (RAM). True False

True

Which of the following is NOT correct regarding browser-based database applications? A. Browser-based applications are thick-client applications. B.Languages like C# and Java are used for server-side processing. C. Forms, reports, and queries are displayed and processed using HTML. D. Browser-based applications are thin-client applications. E.JavaScript is the standard language for user-side processing.

A. Browser-based applications are thick-client applications.

________ are digital-only currencies. A.Cryptocurrencies B.Debit cards C.Online payments D. E-checks E. E-wallets

A.Cryptocurrencies

Which of the following is the most controlling BYOD policy? A.For an organization to declare that it owns any device that employees connect to its network. B.The company creates special logins for BYOD. C.For the company to offer coffee shop style networking. D.If the employee signs on to the company's network, they are financially responsible for any damage done. E.For the organization to sniff employees' mobile traffic.

A.For an organization to declare that it owns any device that employees connect to its network.

Which of the following is NOT an operation performed by a database developer? A.Grants access permission to a database B.Queries the table data C.Create relationships and other structures D.Create tables E.Modify an existing table

A.Grants access permission to a database

What is cardinality? A.It helps to describe the relationship between two entities. B.It corrects and makes the data effective. C.It is the process of creating a representation of data. D.It defines the foreign keys of a table. E.It is the process by which tables are redesigned.

A.It helps to describe the relationship between two entities.

Which of the below defines an identifier? A.It is an attribute or group of attributes whose value is associated with one and only one entity instance. B.It describes characteristics of the entity. C.It is something that a user wants to track. D.It is basically a form of an entity-relationship data model. E.It may represent a physical object, logical construct, or transaction.

A.It is an attribute or group of attributes whose value is associated with one and only one entity instance.

Which of these is an open source operating system? A.Linux B.Firefox C.Windows 10 D.Open Office E.iOS

A.Linux

________ in an E-R diagram refer to the least number of entities required in a relationship. A.Minimum cardinalities B.Minimum candidate keys C.Chernozem cardinalities D.Primary keys E.Foreign keys

A.Minimum cardinalities

________ is the combination of the real physical world with interactive virtual images or objects. A.Mixed reality (MR) B.Reality C.Virtual reality (VR) D.Augmented reality (AR) E.Sense of presence

A.Mixed reality (MR)

Which of the following is a purpose of "application programs"? A.Provide security, data consistency, and special purpose processing like handle out-of-stock situations B.Granting access to the users C.Search based upon data values provided by the user D.View data; insert new, update existing, and delete existing data E.Structured presentation of data using sorting, grouping, filtering, and other operations

A.Provide security, data consistency, and special purpose processing like handle out-of-stock situations

Which of the following is an advantage of employee use of mobile systems at work? A.Reduced support costs B.Loss of control C.Compatibility problems D.Greater support costs E.Data loss or damage

A.Reduced support costs

Which of the following is TRUE about the database development process?A.The database structure is easy to change during the data modeling stage. B.Changing a relationship from 1:N to N:M in an existing database is a complex and lengthy process. C.User review of the data model is avoided as it is not helpful in data modeling. D.Databases are easier to develop than spreadsheets. E.Normalization is unnecessary for large databases.

A.The database structure is easy to change during the data modeling stage.

Web applications are characterized by which of the following? A.They can be run on multiple operating systems without modifications. B.They can run only on a single type of device. C.They are highly secure and easy to use. D.They can use the unique capabilities of the hardware device. E.They are expensive to develop and support.

A.They can be run on multiple operating systems without modifications.

Which of the following statements is TRUE about native applications? A.They only run on the operating system for which they are programmed. B.The cost of native applications is low. C.The limits on native applications are usually technological, not budgetary. D.They are run exclusively through a Web browser. E.They can be developed by less skilled, lesser-paid employees.

A.They only run on the operating system for which they are programmed.

Which of the following tasks cannot be performed using a list but can be managed through databases? A.To keep track of student registration B.To delete C.To store the grades of students D.To perform some calculations like addition and subtraction E.To modify the data that is already present

A.To keep track of student registration

________ is a completely computer-generated virtual world with interactive digital objects. A.Virtual reality (VR) B.Sense of presence C.Mixed reality (MR) D.Reality E.Augmented reality (AR)

A.Virtual reality (VR)

An important advantage of __________ is that the browser provides a generally consistent environment in which to execute. A.Web applications B.native applications C.open source applications D.closed source applications E. custom-developed applications

A.Web applications

The data and relationships that will be stored in a database can be depicted using __________. A.a data model B.attributes C.an entity D.minimum cardinalities E.identifiers

A.a data model

Which of the following is the smallest element in a database? A.byte B.metadata C.field D.zetta E.record

A.byte

A primary key in a database is a ________. A.column or group of columns that identifies a unique row in a table B.group of tables or files formed to identify a unique field or row C.group of rows that identifies a unique table or file D.group of records that identifies similar attribute E.group of fields or columns that represent metadata

A.column or group of columns that identifies a unique row in a table

In a database, when data items are inaccurate and inconsistent with one another, it leads to a(n) ________. A.data integrity problem B.security problem C.adaptation conflict D.data loopback problem E. crow's-foot paradigm

A.data integrity problem

Disruptive forces that have the potential to disrupt business as we know it include all of the following EXCEPT __________. A.data mining applications B. self-driving vehicles C.3D printing D.cryptocurrencies E.Internet of Things

A.data mining applications

Columns that are keys to different tables than the ones in which they reside are called ________. A.foreign keys B.nonlocal keys C.primary keys D.attributes E.internal records

A.foreign keys

If two users of a database access the same record and both attempt to complete an update transaction with that record, the __________problem is likely to occur. A.lost update B.Web browsing C.transaction processing D.power surging E.processing

A.lost update

Which of the following is an example of storage hardware in computers?A.magnetic disk B.inkjet printer C.Web camera D.plotter E.projector

A.magnetic disk

Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________. A.mobile system B.native application C.client operating system D.nonmobile system E.virtual private network

A.mobile system

If a list deals with one theme but is long, put it into a __________. A.spreadsheet B.single list C.separate column D.database column E.cell

A.spreadsheet

Server infrastructure is delivered as a service via the Internet and often referred to as ________. A.the cloud B.main memory C.computer hardware D.SSD storage E.secondary memory

A.the cloud

Web applications are typically limited by the capabilities of the ________. A.programming language B.motherboard C.browser D.hardware E.operating system

C.browser

A ________ is also called "the brain" of the computer. A.motherboard B.thumb drive C.central processing unit D.network card E.CMOS

C.central processing unit

In data modeling, a(n) __________ is something that the users want to store data about. A.relationship B.primary key C.entity D.foreign key E.attribute

C.entity

Each entity in a database has a unique attribute called a(n) ________. A.public key B.index field C.identifier D.foreign key E.prime value

C.identifier

Which of the following is NOT a major element of a mobile system? A.Mobile devices B.Users in motion C. Cloud-based resource D.Light laptops E.Wireless connectivity

D.Light laptops

A ________ describes the data and relationships that will be stored in a database. A.data application B. data-tree model C.data aggregator D.query model E.data model

E.data model

f a database table contains redundant or duplicate data, it can be converted into two tables with better structure through __________. A.creating relationships B.data integrity C.normalization D.cardinality E.data modeling

C.normalization

A data model is a ________. A.collection of isolated databases B.array of data variables C.logical representation of database data D.repository of unprocessed data E.set of programs used to retrieve data

C.logical representation of database data

A________ is equivalent to 1,024 kilobytes. A.gigabyte B.kilobyte C.megabyte D.terabyte E.zettabyte

C.megabyte

Main memory is also known as ________. A.the system bus B. read-only memory C.random access memory D.optical memory E.cache memory

C.random access memory

Identify the first step in transforming a data model into a relational database design. A.creating data triggers for export B.creating foreign keys C.creating a table for each entity D.normalizing the data and files E.representing the entity relationships

C.creating a table for each entity

________ is the process of converting a poorly-structured table into two or more well-structured tables. A.Optimization B.Banding C.Standardization D.Normalization E.Refactoring

D.Normalization

__________ is an international standard language for processing a database. A.RDBMS B.PHP C.HTML D.SQL E.DB2

D.SQL

Data integrity problems are likely to occur when __________. A.attribute conflicts are not resolved B.the data design has a N:M relationship C.data is duplicated D.normal forms are used E.minimum cardinalities are not met

C.data is duplicated

Metadata is/are ________. A.error logs of databases B.data that are encrypted C.data that describes data D.codes used for server-side processing E.more important data

C.data that describes data

Which of the following BYOD policies is likely to be used in a workplace that must maintain strict security standards? A. "We'll check it out, reload software, and then manage remotely." B. "We'll offer limited systems you can access from any device." C. "If you connect it, we own it." D. "We'll be a coffee shop." E. "You're responsible for damage."

C. "If you connect it, we own it."

Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device? A.3D printing B.Internet of things (IoT) C.automated guided vehicles D.visual mapping E. self-driving cars

B.Internet of things (IoT)

________ is a version of Unix that was developed by an open source community. A.Symbian OS B.Linux C.Android D.SPX E.Mac OS

B.Linux

Popular, successful open source software products include all of the following EXCEPT __________. A.Firefox B.MySQL C.Oracle D.Android E.Hadoop

C.Oracle

The major elements in a mobile system include all the following EXCEPT __________. A. cloud-based resources B. in-place users C.users in motion D.wireless connectivity E.mobile devices

B. in-place users

________ reality is the altering of reality by overlaying digital information on real-world objects. A.Enhanced B.Augmented C.Virtual D.Actual E.Mixed

B.Augmented

The DBMS does not provide applications for which operation?A.Deleting data B.Automatically correcting data C.Inserting data D.Reading data E.Modifying data

B.Automatically correcting data

Which of the following is a characteristic of volatile memory?A.Processing of data is very slow. B.Contents are lost when power is off. C.It should be purged at least once a year. D.Files are stored permanently. E.Processor heats up during the operation.

B.Contents are lost when power is off.

Which of the following is TRUE of single-user databases? A.They are displayed and processed using HTML5, CSS3, and JavaScript. B.The application, the DBMS, and the database all reside on the user's computer. C.The Internet is used to access the DBMS server computer. D.They run on clustered Linux or Unix systems E.They use JavaScript for user-side processing.

B.The application, the DBMS, and the database all reside on the user's computer.

When using the relational model to represent two tables, one must ________. A.have more than two primary keys in the model B.add a foreign key to one of the tables C.minimize the number of columns in the second table D.establish only N:M relationships between the tables E.use metadata instead of foreign keys

B.add a foreign key to one of the tables

Bits are used for computer data because they ________. A.represent the orientation of a nonoptical media B.are easy to represent physically C.can have more than two values at a time D.have an infinite number of states E.are represented exclusively as letters of the alphabet

B.are easy to represent physically

A(n) ________ is a program used to create, process, and administer a database. A.operating system driver B.database management system C.information system D.operating system E.database system

B.database management system

In a data model, a(n) ________ is something that a user wants to track. A.record B.entity C.quark D.primary key E.byte

B.entity

All of the following are benefits to using cryptocurrencies except ________. A.there are no taxes B.it is insured by the Federal Reserve Bank C.it is faster and easier to use than traditional payment methods D.there is protection from inflation E.it cannot be seized by the government

B.it is insured by the Federal Reserve Bank

Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a powerful antivirus program. When Toby buys the program, he will actually be buying the software ________. A.code B.license C.copyright D.patent E.trademark

B.license

A database is used instead of a spreadsheet when ________. A.lists of data involve a single theme B.lists involve data with multiple themes C.structures of data lists are simple D.users have a small amount of data to store E.users do not want to store all data in one place

B.lists involve data with multiple themes

Browser applications are thin-client applications that ________. A.use COBOL as the standard language for user-side processing B.need not be preinstalled on the users' computers C.do not need to be encrypted D.are processed using VisualBasic and C++ E.depend on internal networks and not the Internet to transmit data

B.need not be preinstalled on the users' computers

The program that controls the computing device's resources is termed the __________. A.controller B.operating system C.application system D.main memory E.firmware

B.operating system

Every database table must have a __________, a field (or fields) that contains a unique value for every table record. A.primary element B.primary key C.relationship line D.predictive key E.foreign key

B.primary key

Maria creates a relational database to keep track of cars in her repair shop. She stores information about each car in the "vehicle" table, and creates a column labeled "vehicle_ID" where she stores the vehicle VIN number. The "vehicle_ID" column is referred to as a ________. A.secondary key B.primary key C.functionally dependent record D.key attribute E.foreign key

B.primary key

The elements that make up a database application are: forms, application programs, reports, and __________. A.relationships B.queries C.data views D.backups E.performance monitors

B.queries

The rows in a database are also called ________. A.fields B.records C.laterals D.files E.tables

B.records

A computer that supports processing from many computers in other locations is called a __________. A.server farm B.server C.bit D.memory E.client

B.server

_______ are the final judges as to what data the database should contain and how the records in that database should be related to one another. A.Auditors B.Administrators C.Users D.Designers E.Developers

C.Users

A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. A.data bridge B.database design C.database application D.data model E.data field

C.database application

Which of the following is an international standard language for processing a database?A.Cassandra B.Relational LM C. SQL D. DB2 E. MS Access

C. SQL

Which of the following is likely to occur in the future? A.Workers will still need to go in to work to access data. B.Web applications will disappear. C.Your car knows exactly when to self-start so it is warm when you get in. D.Future jobs will require less technical skills. E.Students no longer need to cultivate personal creativity and problem-solving skills.

C.Your car knows exactly when to self-start so it is warm when you get in.

A group of similar rows or records is known as ________. A.a cluster B.a field C.a table D.an attribute E.a prototype

C.a table

Browser-based applications ________. A.run within a corporate network that is protected from the Internet B.need to be preinstalled on the users' computers C.are more vulnerable to security threats than are traditional applications D.do not need to be encrypted E.eliminate the need to check for data consistency

C.are more vulnerable to security threats than are traditional applications

Computers represent data using __________. A.flashes B.functions C.binary digits D.elements E.unary digits

C.binary digits

Mobile systems offer the potential of ________, which is data delivered to the user at the precise time it is needed. A.clean data B.cluster data C. just-in-time data D.granular data E.convenient data

C. just-in-time data

________ is the altering of reality by overlaying digital information on real-world objects. A.Reality B.Virtual reality (VR) C.Augmented reality (AR) D.Sense of presence E.Mixed reality (MR)

C.Augmented reality (AR)

Which of the following statements about client and server computers is correct? A.Servers are less powerful than clients. B.A tablet is an example of a server. C.Clients place requests with servers and servers return data. D.Clients are organized in farms, but servers can be located only in the cloud. E.Servers use the services that clients provide through a network.

C.Clients place requests with servers and servers return data.

________ is the process of converting a data model into tables, relationships, and data constraints. A.Database aggregation B.Data mining C.Database design D.Database cross modeling E.Database querying

C.Database design

________ applications are programs that are written to use a particular operating system. A. Thin-client B.Enterprise C.Native D.Browser E.Web

C.Native

Which of the following statements is true? A. "If the structure of a list is simple enough, it will be necessary to use database technology." B. "Professionals rarely use spreadsheets to keep track of things." C. "Databases are not used to keep track of things." D. "If the structure of a list is simple enough, there is no need to use database technology." E. "Setting up different forms of data in separate spreadsheets is an effective way to keep track of that data."

D. "If the structure of a list is simple enough, there is no need to use database technology."

Which of the following is NOT a valid type of relationship? A. One-to-many B. One-to-one C. Many-to-many D. None-to-none E. Many-to-one

D. None-to-none

Which job will NOT be considered to be the hot job in the future? A. Dev-Ops manager B.Marketing technologist C.Big data architect D. PL/SQL developer E.IOT architect

D. PL/SQL developer

Which of the following statements about software is true? A.Organizations make a lot of money selling licenses to open source software. B.It is perfectly fine for an organization to buy one copy of a software product and copy it on to all its computers. C.Operating systems for clients and servers is identical. D.Buying software means you own a license to use the software. E.Buying software means you own the software code.

D.Buying software means you own a license to use the software.

Which of the following is a Web-based programming language? A. C# B. Objective-C C. C++ D.CSS3 E.VB.net

D.CSS3

Which of the following statements is correct? A.The user does not need to dedicate special time to reviewing the data model. B.If corrections are needed in the database structure, the requirements step is the best time to do this. C.A database is a model of how only managers view their business world. D.Do not proceed with database design unless the data model is accurate. E.If the data model is incorrect, the database can still be used successfully.

D.Do not proceed with database design unless the data model is accurate.

Which feature does not qualify a phone to be a smart phone? A.More memory B.A phone that has more processing power C.Ability to interconnect with other devices D.Having good voice quality E.Internet and Wi-Fi access

D.Having good voice quality

The angled lines on the lines representing relationship between two related entities are referred to as ________. A.foreign keys B.entities C.identifiers D. crow's feet E.switch

D. crow's feet

Which of the below is a mobile operating system? A.Mac OS B.Windows Server C.Unix D.Android E.Linux

D.Android

The DBMS does not provide applications for which operation?A.Modifying data B.Deleting data C.Inserting data D.Automatically correcting data E.Reading data

D.Automatically correcting data

The __________ will allow all the devices in your home to be connected and will enable it to see what, how, and when you do things and anticipate your needs. A.capacity of 3D printing B.advances in self-driving cars C.relaxation of BYOD policies D.Internet of Things E.improvements in vertical-market software

D.Internet of Things

Web applications are characterized by which of the following? A.They can run only on a single type of device. B.They can use the unique capabilities of the hardware device. C.They are expensive to develop and support. D.They can be run on multiple operating systems without modifications. E.They are highly secure and easy to use.

D.They can be run on multiple operating systems without modifications.

Which of the following is TRUE of N:M relationships? A.They are also called one-to-many relationships. B.They are the same as N:N relationships. C.They connect different data types. D.They can have more than one entity on each side of the relationship. E.They represent minimum cardinalities in a relationship.

D.They can have more than one entity on each side of the relationship.

Which of the following statements refers to server virtualization? A.a server can connect to multiple networks at the same time B.a storage area that loses its contents when the power is off C.a personal computer, such as a desktop or portable computer, that hosts several different operating systems D.a server computer that hosts one or more other server computers E.a server that hosts many versions of desktop operating systems

D.a server computer that hosts one or more other server computers

A database __________ is a collection of forms, reports, queries, and application programs. A.metadata B.function C.relationship D.application E.field

D.application

Melissa is a senior accountant at a consulting firm. She brings to her manager's notice the considerable amount of time that is wasted when accounting tasks are performed manually, and proposes that the department automates these tasks. Melissa's accounting department is in need of a(n) ________. A.operating system B.firmware C.system software D.application software E.network connection

D.application software

Bits are grouped into 8-bit chunks called ________. A.switches B.nibbles C.kilobytes D.bytes E.strings

D.bytes

Current 3D printing technology __________. A.is unable to create objects with much strength B.is unlikely to affect existing industries significantly C.is basically focused on toy manufacturing D.can print in an array of materials E.is limited to plastic materials

D.can print in an array of materials

The designers of a database typically begin by developing a __________ to construct a logical representation of the database before it is implemented. A.network diagram B.3D representation C.process model D.data model E.line drawing

D.data model

The CPU stores the results of computations in ________. A.floppy disks B.SSD storage C.secondary memory D.main memory E.network cards

D.main memory

In an E-R diagram, a line between two entities represents a(n) ________. A.attribute B.branch C.cardinality D.relationship E.identifier

D.relationship

Which of the following terms refers to a collection of servers?A.firmware B.server database C.shareware D.server farm E.parallel nodes

D.server farm

Which of the following notations in an E-R diagram means that the entity is optional and a relationship need not have an entity of that type? A.arrow B.double line C.vertical bar D.small oval E.triangle

D.small oval

Users in motion require all the following cloud resources EXCEPT __________. A.application code B.data sources C.email service D.wireless connectivity E.Web sites

D.wireless connectivity

In a database, ________ are grouped into columns. A.files B.fields C.records D.nibbles E.bytes

E.bytes

The three essential elements of the definition of a database are __________. A. fields; relationship among fields in tables; metadata B.validation rules; data; tables C. tables; relationship among rows in tables; validation rules D. tables; metadata; validation rules E. tables; relationship among rows in tables; metadata

E. tables; relationship among rows in tables; metadata

All of the following are disruptive forces to change business except ________. A.digital reality devices B.cryptocurrencies C. self-driving cars D.Internet of Things E.2D printing

E.2D printing

Which of the following is NOT a capability of mobile device management (MDM) software?A.Restoring a device. B.Reporting usage of the device. C.Install and update software. D.Perform a back-up of the device. E.Automate sending of text messages on behalf of the user.

E.Automate sending of text messages on behalf of the user.

Carter is the Web designer for an open source project. He has created a program that facilitates the easy collation of data for a large-scale logistics firm. Which of the following is TRUE of the source code for Carter's program? A.It is available only to carefully vetted contractors. B.It is highly protected and obtained only by having a license. C.It is less stable and platform dependent. D.It cannot be compiled. E.It is available to the public.

E.It is available to the public.

What is the main feature of metadata?A.It contains only the primary keys. B.It stores all the data from tables. C.It contains only the foreign keys. D.It contains the column definition. E.It is the data about data.

E.It is the data about data.

Which of the following is NOT a resource found in the cloud?A.Application code B.Web sites C.Email and IM services D.Data sources E.Mobile device

E.Mobile device

Why is user involvement critical for database development? A.Because they use the system. B.Because users design the system. C.The executive board says it is critical. D.The data model states it is important. E.The design of the database depends on how users view their business environment.

E.The design of the database depends on how users view their business environment.

Entities in a data model have ________ that describe the characteristics of the entity. A.characters B.codes C.primary keys D.scribes E.attributes

E.attributes

The limits on creating native applications are usually ________, not technological. A.based on requirements B.in finding skilled programmers C.based on an executive board decision D.based on complexity E.budgetary

E.budgetary

An organization has identified a new business process that will revolutionize its industry. To obtain the software that will be needed to support this business process, it will be necessary for the organization to __________. A.abandon the idea since no software exists B.buy a horizontal application off the shelf and customize it C.buy a one-of-a-kind application off the shelf D.buy a horizontal application off the shelf E.develop a one-of-a-kind application using custom development

E.develop a one-of-a-kind application using custom development

Which of the following is a developmental task of database administration? A.testing backup procedures B.managing configuration changes in systems C.monitoring backup procedures D.conducting training for users E.evaluating an application design

E.evaluating an application design

The columns in a database are also called ________. A.files B.verticals C.tables D.records E.fields

E.fields

Katrina is a sales representative for an online retailer. She needs to update her customer list with new contact information for five customers. Which of the following elements will help Katrina modify her data? A.operations B.reports C.triggers D.queries E.forms

E.forms

All of the following are functions of the DBMS except ________. A.providing tools to administer the database B.processing the database C.modifying the database D.creating the database E.getting the users to use the database

E.getting the users to use the database

The disadvantages of employees using their own mobile devices at work include all the following EXCEPT __________. A.compatibility problems B.greater support costs C.risk of infection D.loss of control E.greater employee satisfaction

E.greater employee satisfaction

The disadvantages of employees using their own mobile devices at work include all the following EXCEPT __________. A.compatibility problems B.loss of control C.greater support costs D.risk of infection E.greater employee satisfaction

E.greater employee satisfaction

The purpose of a database is to __________. A.eliminate the need to learn programming B.make the use of the cloud more straightforwardly C.eliminate the need to learn about spreadsheets D.keep track of things that share a single theme E.keep track of things that involve multiple themes

E.keep track of things that involve multiple themes

When you state a business rule that pertains to your organization, such as "At my university, a student must declare a major," you are actually defining the __________ of the relationship between students and majors. A.relational limits B.foreign keys C.normality D.maximum cardinality E.minimum cardinality

E.minimum cardinality

Virtualization is the process by which ________. A.many computers are used to control a server B.a single operating system is shared by multiple users C.a single server is used to host the operations of a workstation D.a single operating system is licensed for multiple computers E.one physical computer hosts many different virtual computers within it

E.one physical computer hosts many different virtual computers within it

Which of the following devices is an example of a storage hardware device? A.barcode scanner B.central processing unit C.random access memory D.the system bus E.optical disk

E.optical disk

The modification or deletion of data in a database is an example of ________ operations of a database management system. A.technical B.statistical C.administrative D.analytical E.processing

E.processing

All of these issues are results of data integrity problems except ________, A.the system will develop a poor reputation B.users lose confidence in the data C.inconsistent results D.incorrect results E.the system will give users too much information

E.the system will give users too much information


Conjuntos de estudio relacionados

Life Insurance: Specific Life Law (9 questions)

View Set

Ch12 developing new products MKT IBC

View Set

2.03 Why The Declaration of Independence Important

View Set