IS 475 - Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

NoSQL Stands For ___

"Not only SQL"

What is the cardinality constraint for the following statement? A member can enroll in as many classes as they would like to this year. _____

0..M

Within the XML formatting rules, how many root elements can there be? 5 4 1 12 20

1

Which one is data, and which one is information? Products in the store supplied by 37 vendors Price of the products ranges from $5 to $300

1st is data 2nd is information

What does DDL stand for? A. Data Definition Language B. Database Design Language C. Data Description Language D. Data Design Language E. Digital Database Language

A

Which command is used to organize SQL results? a. ORDER BY b. SET BY c. ORGANIZE BY d. SORT BY e. None of the above

A

Which of the following is the correct format for data insertion? A. INSERT INTO Inventory VALUES ('0060','A029',10); B. INSERT INTO VALUES ('0050','G009',5); C. INSERT ('0050','G009',5); D. VALUES into INVENTORY (5, '0936','ABS'); E. INSERT INTO VALUES ('0060','A029',10);

A

Which would be the correct way to rename a column in SQL? a. Select product_name as 'Product' b. Select product_name as Product c. Select product_name as (Product) d. Select product_name as "Product"

A

Below are benefits of SQL EXCEPT? A. High training costs B . Increased productivity C. Improved application portability D. Reduced dependence on a single vendor E. Enhanced cross-system communications

A. high training costs

The ____________ framework of data quality categorizes the dimension of data retrieval.

Access

2. A ______ is used to simplify SQL commands.

Alias

A good business rule is Business-oriented Declartive and Precise Atomic and distinct All of the above None of the above

All of the above

What are the Data Quality Dimensions that a framework categorizes? Intrinsic Contextual Representation Access All of the above

All of the above

What is Data Governance used for? A. Improve data capture process B. Perform data quality audit C. Establish data stewardship program D. Apply total quality management (TQM) practices E. All of the above

All of the above

Which of the following are causes of poor data quality? Multiple data sources Volume of data Lack of organizational commitment Limited computing resources All of the above

All of the above

Which one of the following are different joining keywords in SQL? INNER JOIN LEFT JOIN RIGHT JOIN FULL OUTER JOIN All of these are JOIN keywords in SQL

All of these are JOIN keywords in SQL

Which of the following are not part of the security policies and procedures of data? Personnel controls Anti-theft controls Physical access controls Maintenance controls Data privacy controls

Anti-theft controls

Which of the following traits out of this list is a part of Contextual segment of Data Quality Dimensions? a) Appropriate amount b) Traceability c) Concisely-represented d) Interpretable e) Alignment

Appropriate amount

A disjointness generalization constraint specifies which one of the following: A. An entity can be a member of more than one subtype B. An entity can be a member of at most one subtype C. An entity does not inherit from a superclass D. The union of the subtypes partially covers their supertype E. None of the above

B

Fill in the blank: In a table, a _______ represents data values describing a real-world entity instance or relationship instance, and a ________ represents a property or characteristic of an entity or relationship type of interest. a. Attribute; relation b. Tuple; attribute c. Primary key; domain d. Domain; values e. Relation; tuple

B

Object-oriented concepts combine data and behavior via ____? a. propagation b. encapsulation c. normalization d. interfacing

B

When creating a table, what does 'NOT NULL' imply? A) The record in the table is blank B) The record in the table must have a value in it C) Only numbers can be input into the record of the table D) You must leave this record blank, and update it later E) You do not care what is input in this record

B

Which SQL constraints are used to uniquely identifies a row/record in another table? a. Unique b. Primary key c. Foreign key d. Index e. Distinct

B - primary key

What is the correct format order of SQL commands when using a select expression: A) Group BySelectWhereFROM B) Select From Where Group By C) FromSelectGroup ByWhere D) None of the Above E) The Order doesn't matter

B) SELECT FROM WHERE GROUP BY

Which of the following in an Entity Relationship Diagram is completely written with capital letters? Attributes Entity Types Relationship Types Multi-Valued Attributes Derived Attributes

B. Entity Types

Which of the following clauses forces the tuples resulting from a query to appear in a particular sorted order? a. SORT BY b. ORDER BY c. RULE BY d. GROUP BY e. LIST BY

B. Order By

Each of the following are security measures against application issues EXCEPT: Test Application Programs Building safeguards into the code Spam Filtering Better Training Educating the Users

Better training

What operator defines a range of values that the column values must fall in? Between Like Is In And

Between

Given the SQL script, are there any errors that could lead to an error when executed? SELECT ingredient FROM Recipe WHERE ingredient = 'Eggs' ORDER BY ingredient GROUP BY ingredient HAVING count(*) = 1; a. The Column names are not capitalized. b. A single quotation is used rather than a double quotation for 'Eggs.' c. Order By should be listed at the end of the script. d. Group by should be listed after Having. e. There is nothing wrong with the script and should run properly

C

The six clauses of the SELECT statement must be coded in the following order: A)SELECT, FROM, GROUP BY, HAVING, WHERE, ORDER BY B)SELECT, FROM, WHERE, ORDER BY, GROUP BY, HAVING C)SELECT, FROM, WHERE, GROUP BY, HAVING, ORDER BY D)SELECT, FROM ORDER BY, WHERE, GROUP BY, HAVING E)SELECT, WHERE, FROM, ORDER BY, GROUP BY, HAVING

C

What is the advantage of an object-oriented database design? A. Inclusion of more semantic information in the database B. Permit the extensibility of base data types, thereby increasing both the functionality C. Both A and B D. Opposition from the firmly established RDBMSs E. None

C

Which of these speakers did we not watch regarding the Dark Side of Data? A. Jennifer Golbeck B. Malte Spitz C. Tim Smith D. Alessandro Acquisti E. Ben Goldacre

C

Which of the following is a way data could be misused? A) Using SQL to analyze and draw conclusions from the data B) Assuring results are statistically significant C) Ignoring results that are counter intuitive D) Discussing the data with well-informed individuals E) Creating visual descriptions of the data

C) Ignoring results that are counter intuitive

Multiple Choice: What are three types of data integration approaches discussed in class? A) consolidation, federation, and propaganda B) limitation, normalization, and consolidation C) consolidation, federation, and propagation D) consolidation, propagation, and admiration E) propagation, innovation, and regulation

C) consolidation, federation, and propagation

Which of the following would be classified as a property or characteristic of an entity type or relationship type that is of interest to the organization? A. Entity Type B. Relationship Type C. Attribute D. Instance E. Degree

C. Attribute

Which of the following are NOT causes of poor data quality? A) Duplicates data B) Ambiguous data C) Unique data D) Inconsistency E) None of the above

C. Unique data

When using order by function, where do you put the group by function? A. Before the order by B. After the order by C. You don't need a group by function D. Order by needs to be used in a subquery E. Group by and order by need to be used in a subquery

C. You dont need a group by function

Which relationship type creates a new relation table? A. One-to-Many B. One-to-One C. Many-to-Many D. All of the above E. None of the above

C. many-to-many

4. SQL offers a number of built-in functions. The _______ function returns the number of tuples or values specified in a query.

COUNT

Which choice is not part of SQL constraints? UNIQUE NOT NULL PRIMARY KEY CREATE DEFAULT

CREATE

Ther are different frameworks that categorize the different dimensions of data quality. Intrinsic is: Data in a certain context How data is represented Charateristics of data Data retrieval None of the above

Charateristics of data

Which security goal should ALH Enterprises focus on if their goal is to protect their data from unauthorized access? Integrity Confidentiality Compliance Diligence Availability

Confidentiality

What are some of the dark sides to big data?

Confidentiality, privacy, and anonymity

A database design process determines the _____ of a database system. Content and Structure Creativity and Market Appeal Security and Reliability Cost and Function Legality and Regulations

Content and Structure

Which of the following is NOT a characteristic of business rules? Declared to control/influence business behavior Expressed in terms familiar to end users Created solely by upper management Automated through DBMS software Consisting of data name and data definition

Created solely by upper management

LDA is a method of semantic analysis that extracts themes from a dataset and utilizes topic models. It stands for which of the following: A. Local Data Access B. Latent Digital Allotment C. Linear Direction Allocation D. Latent Dirichlet Allocation E. Leading Dimension Assessment

D

What does a well-designed database do? A)Facilitates data management B)Write queries C)Generates accurate and valuable information D)A and C E)B and C

D

Which of the SQL command(s) would you use to eliminate duplicate rows and display a unique list of values for "Names"? A) SELECT DISTINCT Names B) GROUP BY Names C) DELETE FILES DUPLICATE Names D) Both A and B E) None of the above

D

Which of the following is not a part of the security policies and procedures? a. Personnel controls b. Data privacy controls c. Physical access controls d. Data leak controls e. Maintenance controls

D - data leak controls

Which of the following best describes the term compliance with regards to data security goals? A)Protecting data against unauthorized access B)Keeping data consistent and free of errors or anomalies C)Accessibility of data whenever required by authorized users D)Activities that meet data privacy and security reporting guidelines E)Maintaining the size of data on a cloud platform

D) Activities that meet data privacy and security reporting guidelines

Data Manipulation Language (DML) is: a ) command that visualizes a database b ) command that controls a database c ) command that define a database d ) command that maintain and query a database e ) command that simplifies a database

D.

Data Definition Language (DDL) consists of the SQL commands are used to define a database, including A. Creating B. altering C.A & B D. All E. None

D. All

Which of the following is true about Completeness and Consistency Checks? A. All entity types have a key attribute (identifier) B. All relationship types connect entity types C. All relationship types' names are unique D. All are correct. E. None

D. All are correct

Which SQL constraint uniquely identifies a row/record in another table? A. NOT NULL B. DEFAULT C. UNIQUE D. FOREIGN KEY E. PRIMARY KEY

D. FOREIGN KEY

Multiple Choice: In order to eliminate possible duplicates in a select clause, you must specify which operation? DISTINCT WHERE ORDER BY HAVING GROUP BY

DISTINCT

When creating a SQL query, you are worried about duplicate results. What command should you add to your code to ensure this doesn't happen? A) INNER JOIN B) SUM C) DELETE CASCADE D) DISTINCT E) COUNT

DISTINCT

When showing a Derived Attribute it is seen as a A. Solid Circle B. Dashed Circle C. Underline text only D. Bold Letters E. Double Circle

Dashed Circle

2. ______________ consists of the SQL commands used to define a database, including Creating, altering, dropping tables and established constraints.

Data Definition Language

4. The data integration technique of duplicating data across databases with near real-time delay is known as ____ ___________.

Data Propagation

Describe the differences between the three techniques for data integration

Data consolidation - consolidate data into centralized database Data federation - virtual view of data Data propagation - duplicate data across databases

______ ______ is the ability of an object to hide data from other objects.

Data hiding

Which of the following is NOT considered a database security feature? a. Integrity controls b. Authorization rules c. Encryption d. Data safe connect e. All of the above can be considered database security features

Data safe connect

Which of the following is not an example of security policies and procedures? Personnel controls Physical access controls Data Sharding Maintenance controls Data privacy controls

Data sharding

What does a dotted ellipse represent in an ER-Diagram? Unique key attribute Primary key attribute Foreign key attribute Multi-valued attribute Derived attribute

Derived attribute

What are the 3 ETL Activities? A.Extract data, Take out data, Unload transformed data B. Extract data, Transform data, Lose all data C. Extract computer , Transform data, Load transformed data D. Transform data, Extract data, Do not transform data E. Extract data, Transform data, Load transformed data

E

What are the rules of ER modeling? A. Each entity type should have more than one attributes B. Each statement in the specification should be located in the ERD. C. Each ERD construct should be located somewhere in the requirement specification. D. No duplicated entity or relationship name. E.All of the above

E

What does a Data Definition Language consist of: A. Creating Tables B. Altering Tables C. Dropping Tables D. Establishing Constraints E. All of The Above

E

Which is an importance of data models? A. A communication tool B. Give an overall view of the database C. Organize data for various users D. Are an abstraction for the creation of good database E. All of the above

E

Which is not a PRO of Data Federation? A. Data always current when requested. B. Works well for read-only applications because only requested data needs to be retrieved. C. Ideal when copies of source data are not allowed. D. When data integration needs cannot be anticipated. E. Heavy workloads possible for each request due to performing all integration tasks for each request.

E

Which of the following is NOT a key characteristic of a database? A. Self-describing collection of data B. Related data C. Integrated data D. Shared data E. Interactive data

E

Which symbol have we not used in this class to notate an ERD? A. Rectangle B. Ellipse C. Diamond D. Upside-down Triangle E. Trapezoid

E

Which SQL statement is used to extract data from a database? a. WHERE b. FROM b. INSERT d. GROUP BY e. SELECT

E. Select

Problems of using a File system are mentioned below EXCEPT? A. Data Inconsistency B. Data Redundancy C. Limited Data Integration D. Ineffective/inefficient System Maintenance E. Easy for data querying and retrieval

E. easy for data querying and retrieval

____ is defined as the ability to hide the object's internal details, including its attributes and methods.

Encapsulation

Multiple Choice: What does the abbreviation, XML, stand for? Xtreme Markup Language Extensible Markup Language Extra Manipulation Language Xtreme Manipulation Language Extended Marking Language

Extensible Markup Language

What causes of Poor Data Quality A. Multiple data sources B. Volume of data C. External data sources D. Limited computing resources E. A, B and C F. All

F

(T/F) Two entities can't have more than one type of relationship between them.

False

1) (T/F) Data includes raw facts, are building blocks of information, and enables knowledge creation.

False

1. T/F - A multi-valued attribute is signified by a dotted ellipse, while a derived attribute is shown through a double-lined ellipse.

False

1. T/F: Data insufficiency is a major problem of the file-processing approach.

False

1. T/F: Looking at the ER diagram above, the attribute "Experience" is NOT a derived attribute.

False

1.T/F when creating a logical schema multi-valued attributes don't get their own table.

False

2. T/F: The only operator that can signify Not equal to is "!=".

False

2. True or False? Client and server processes cannot reside in the same computer.

False

3. True or False: XML is not case-sensitive.

False

4. True or False: A client is a process that provides requested services for clients.

False

: Causality - Cannot be explained, or rationalized by "theories" T/F

False

Data consolidation provides a virtual view of data without creating one centralized database. T/F

False

Function like calculate average and maximum price for product can be included in ER diagram? T/F

False

Legal Values and temporal constraints can be included/modeled in ER models. T/F

False

T/F An entity type is represented by a diamond shape in an ERD.

False

T/F Consistency checks require that all relationship types and attribute names are not unique.

False

T/F): Two entities can only have one type of relationship between them.

False

T/F: An attribute is described only once in the model and the database.

False

T/F: An example of a business rule would be, "Friday is business casual dress day."

False

T/F: Data is a set of values of qualitative variables.

False

T/F: Variable Character Field is a set of character data of determinate length

False

To transform a 1-to-1 relationship type, a new relation is created with both primary keys as foreign keys in the new relation. T/F

False

True or False: In SQL, char(50) and varchar(50) are exactly the same.

False

True or False: Security goals include confidentiality, compliance, integrity, availability, and accuracy.

False

True or false? SQL has a strict case-sensitive structure that must be followed.

False

Which of the following is not an aggregation function in SQL? SUM() COUNT() AVG() GETDATE() MAX()

GETDATE()

Which is the default "Join" operation? Inner join Left outer join Right outer join Outer join All of the above

Inner join

When creating a database, which of the fields do not require the use of quotation marks? Char Varchar Integer Date Time

Integer

What are the 4 data quality dimensions?

Intrinsic, Contextual, Representation, Access

What are the four different dimensions of data quality?

Intrinsic, Contextual, Representation, Access

SQL offers a number of built-in functions EXCEPT: COUNT SUM MED MAX MIN

MED

Data Definition Language (DDL) consists of the SQL commands used to define a database including all of these except: A) Creating B) Modifying C) Altering D) Dropping tables E) Established constraints

Modifying

Which of the following is NOT part of Representation in Data Quality Dimensions? Interpretable Easily-understandable Concisely represented Objectivity Consistency

Objectivity

A single teacher can teach multiple classes would best fit which cardinality?

One-to-many

Multiple Choice - Which of the following is NOT a security vulnerability regarding application issues? Bugs SQL injection Social engineering Non-validated inputs Packet sniffers

Packet sniffers

Developed by ___ in 1976, ER is the most popular conceptual model in database design Michael Afton Peter Chen Jamie Vaughn Claire McField Paul Geller

Peter Chen

Data Federation provides a virtual view of the data warehouse, creating a centralized database. What approach does it use? Push Approach Pull Approach Decentralized Full Update Strategy Real-time Data

Pull Approach

By using in your SQL query, you can get rid of duplicate results. a. SELECT EXACT b. SELECT MAX c. SELECT DISTINCT d. SELECT MIN e. A AND B

SELECT DISTINCT

Which choice is not a characteristic of an Objected-Oriented Data Model? Support the representation of complex objects Capable of defining new data types as well as the operations to be performed Support encapsulation Exhibit inheritance Support a combination of a start tag, content and end tag

Support a combination of a start tag, content and end tag

1. True or False: The purpose of a database is to store, manipulate, and retrieve data in organizations.

TRUE

Which of the following is the correct definition of Inheritance within Database Design? An object within the hierarchy that is ready to become the king when the old king is gone Receiving money or valuables from a family member when they pass away. The ability for an object within the hierarchy to inherit data from the class above it. The inclusion of more semantic information in a database An object that avoids the join operator

The ability for an object within the hierarchy to inherit data from the class above it.

What is a disadvantage of object oriented database design? A)More semantic information can be included. B)Complex objects are supported. C)There is no standard ad hoc query language. D)OODMBS can allow for a more realistic representation of real-world objects. E)Application development time is faster.

There is no standard ad hoc query language

Which of the following best describes the purpose of the GROUP BY clause for sql statements? To list a certain attribute in ascending or descending order To aggregate records based on a specified column To list a condition for a specified column To split the data into groups based on a condition To build clusters based on algorithms for analysis

To aggregate records based on a specified column

% Matches Any Substring, And _ Matches Any (Single) Character T/F

True

(T/F) One important component of DBMS is the query processor that takes care of the actual execution of queries by calling on the storage manager to retrieve the data requested.

True

(T/F) The right outer join and left outer join operators can be used interchangeably as long as the correct table is named.

True

1. T/F - A subtype entity inherits values of all attributes of the supertype

True

1. T/F Subtypes are able to have relationships with other subtypes

True

1. T/F: Business rules must have impacts on an organization's database, and define the situation of a transaction to be accepted or rejected.

True

1. T/F: Information should be accurate, timely, and relevant to enable good decision making

True

1. T/F: The Database design process consists of Conceptual Database Design, Logical Database Design, and Physical Database Design.

True

1. T/F: The Entity Relational Diagram contains an entity type, a relationship type, and its respective attributes.

True

1. True or False: A database is a collection of related data items within a specific business process or problem setting.

True

1. True or False: Data is collected and analyzed to create information suitable for making decisions.

True

1. True or False: Database is a superior approach to the file system.

True

2. True/False: SQL has become the de facto standard language for creating and querying relational databases.

True

3. An entity has data components and relationships but lacks manipulative ability.

True

3. T/F When using federation as a data integration technique all data is stored without actually creating one centralized database.

True

3. T/F: A class can be viewed as a template that can be used to create/instantiate objects of the same type.

True

3. T/F: Applications and databases traditionally are organized around domains such as accounting, human resources, logistics and CRM.

True

3. True/False: Data consolidation pushes all data into a centralized database similar to a data warehouse.

True

4) (T/F) Data includes raw facts, are building blocks of information, and includes data management (generation, storage, and retrieval of data).

True

4. T/F: MySQL is an example of a relational database management system.

True

4. T/F: Security is the extent to which access to data is restricted appropriately to main its security?

True

4. TRUE or FALSE: The following SQL commands are in correct order: select, from, where, group by, having, order by.

True

4.) T/F: An example of information is "On average, 52 customers come to the store every day, and about 30% will purchase something."

True

INSERT INTO Inventory (Quantity, Stack_No, Product_ID) VALUES (9, '0011','A002'); And INSERT INTO Inventory VALUES ('0011','A002',9); These two statements do the same thing: T/F

True

In a logical schema, the columns are known as attribute and the rows are known as tuples. T/F

True

Metadata refers to data that describes important properties, characteristics, or structure of the data of interest

True

T/F - A subtype does not have its own primary key, since it is inherited from the supertype.

True

T/F : A class is a collection of similar objects with shared structure (attributes) and behavior (methods)

True

T/F : Data can be seen as stored representations of objects or events.

True

T/F : SQL stands for Structured Query Language.

True

T/F Security Policy is the Collection of standards, policies, and procedures created to guarantee Securit

True

T/F When creating a logical schema where an entity has a multi-valued attribute, create a new table that Includes the primary key from the original table and the multi-valued attribute. List both as primary keys in the new table.

True

T/F: A one-to-many cardinality is where entity A is associated with any number of entities in B and an entity B is associated with at most one entity in

True

T/F: Accuracy is the extent to which data is certified, error-free, correct, flawless and reliable

True

T/F: Data consolidation involves ETL activities.

True

T/F: Data includes raw facts, building blocks of information, and data management.

True

T/F: Metadata, also referred to as schema, is data about data?

True

T/F: Subquery can be used as a comparison value and temporary table

True

T/F: Using virtual private networks (VPNs) can prevent network issues

True

T/F: When creating logical schema, in a one-to-many relationship, the primary key of the one relationship side becomes a foreign key in the many relationship side.

True

T/F: You must use quotation marks for the date datatype in MySQL.

True

To manage and safeguard data quality a data governance culture should be put in place assigning clear roles and responsibilities. T/F

True

True or False, there are at least 2 ways to write an Inner Join statement that will result in the same table.

True

True or False- You can use IS NULL or NOT NULL in the WHERE clause.

True

True or False: A many to many relationship type does not need its own table.

True

True or False: XML data is hierarchically structured.

True

True/False: The HAVING clause can only appear in conjunction with a GROUP BY clause.

True

When converting an ER diagram into logical schema, list a composite attributes by its sub attributes. True False

True

A Combination of a start tag, content and end tag is called a(n) __________.

XML element

Which of the following best describes the role of a Database Administrator (DBA)? a.) translates conceptual data model into a logical and internal data model b.) responsible for the implementation and monitoring of the database c.) develops database applications in a programming language such as Java or Python d.) run the application to perform specific database operations. e.) None of these describe a Database Administrator

b

An entity type in an ER model is usually given a name (noun, singular, upper-case letters) and placed inside a ______. a) Circle b) Diamond c) Rectangle d) Hexagon e) None of the above

c) Rectangle

Which of the following are not part of security goals with data? a. Confidentiality b. Compliance c.Integrity d. Availability e. Cultural

cultural

A person responsible for ensuring that organizational applications properly support the organization's enterprise goals is a

data steward

___ is data that suffer from inaccuracies and inconsistencies.

dirty data

In a disjoint specialization, an entity can be a member of at most one subtype of the specialization relationship.

disjoint

Which of the following is true regarding naming a constraint, rather than leaving it anonymous? a) It would be difficult to modify a constraint in the future if it is not named b) If a query (insert, update, delete) violates a constraint, SQL will generate an error message that will contain the constraint name c) The error message will be easier to understand if the constraint name is clear and descriptive d) When a constraint is created without a name, the DBMS will assign one e) All of the above

e) All of the above

Which of the following is the correct way to identify the primary key in MySQL? a. Prj_No char(3) primary key b. Prj_No char(3) DEFAULT= 'primary key' c. CONSTRAINT PK_Project primary key(Prj_No) d. Prj_No char(3) references primary key e. Both a. and c.

e. Both a and c

Query processor assists in the execution of database queries such as a. retrieval of data b. insertion of data c. update of data d. removal of data e. all of the above

e. all of the above

The OO Data Model is capable of exhibiting inheritance and supporting _______

encapsulation

A person, place, item, event, or concept about which we want to preserve data is referred to as an

entity

2. True or False: A server is any process that requests specific services from server processes.

false

True or False: The difference between an entity and an object, is an object has data components and relationships, but lacks manipulative ability.

false

3. Data quality determines the ______ of the data to the business.

intrinsic value

A one-to-one relationship type can be viewed as a special case of ________ relationship type.

one-to-many

3. Data profiling needs to be completed ____________.

periodically

Data _____ is a multi-dimensional concept.

quality

When working in MySQLWorkbench, you must ____________ the schemas section in order to see any new tables you may have created.

refresh

2. Fill in the Blank: Subqueries are an alternate way of _________ data from multiple tables.

returning

Metadata is also known as what? a ) big data b ) schema c ) attribute d ) syntax e ) database

schema

Main Cause of Security Vulnerability are mentioned EXCEPT? A. Technical: Flaw in the system B. Managerial: Insufficient user knowledge C. Cultural: Bad user practices D. Procedural: Insufficient security requirement E. Software: Outdated operating system

software outdated operating system

What inherits all attributes of a supertype?

subtype

Fill in the Blank: Data Propagation allows for _____ propagation of updates/events in the source system to the target system.

synchronous

The class describes a ______ of object.

type


Conjuntos de estudio relacionados

Module 9 - Chapter 10 - Water: Hydrologic Cycle and Human Use

View Set

Колоїдна хімія: "Колігативні властивості розчинів"

View Set

Electrical Level 3 Module 1 Load Calculations and Branch Feeder Circuits

View Set

harvill ch23/24 jgjgjgjgjgjgjgjgjgjgjgjgjgj

View Set

1128 Final Preload and Afterload quiz

View Set

Interactions among branches of government

View Set