bcis review 6, bcis lesson 10, bcis 7 review, bcis lets review 9

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

List the four parts of a URL.

A URL is broken into four parts: Protocol ("http") Domain name ("www.espn.com") Path ("cowboys") Resource name ("cowboys.htm")

Describe a Blog or Weblog.

A blog or weblog is a Web site that consists of a series of entries arranged in reverse chronological order, often updated frequently with new information about particular topics.

Explain the concept of browser cache.

A browser cache is used for the temporary storage of web pages on your hard disk. The first time you visit a website, the page(s) is retrieved from the Web. If you request this same page again, the browser first checks to see if it has already visited that page in the recent past. If so, the computer attempts to read the page from its cache, instead of spending the extra time to download it again.

What is the purpose for an IP address?

An IP address is used to identify all of the nodes on a network.

What will happen if you assign a number data type to store a person's last name?

An error will occur

Provide an example of a many-to-many relationship.

An example of a many-to-many relationship is the Students and Classes relationship—a student can take more than one class and more than one student usually takes a class.

A(n) __________________ is a business that offers users access to the Internet, typically for a monthly fee.

Internet service provider (ISP)

What are the two main goals of a primary key?

It must contain a unique value for each row of data, and (2) it cannot contain a null value.

What is the advantage to creating a dropdown box with predefined state abbreviations for the user to enter a state when filling out a form?

It reduces user error as the user is forced to choose one of the predefined values in the list

Which social networking site focuses on business?

LinkedIn

__________ involves dividing the database into two or more tables and defining a relationship between them.

Normalization

__________ is a relationship where each record in the parent table has one or more related records in the child table. The one-to-many relationship is the most common type of relationship. A frequently used example is that of the Customer and Orders tables. The Customer table is the parent table and usually contains a CustomerID field, which is set as a primary key.

One-to-many

Why are packets segmented or split when they are sent over the Internet?

Packets are segmented when the data packet is larger than the maximum transmission allowed by the network. The packets of data are simply too large.

Explain TCP/IP.

TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The IP portion of the protocol is responsible for assigning an address to each packet so that it gets to the correct destination.

What are top-level domain (TLD) names?

TLD are the extension of a domain name, such as .net, .gov, .edu, .com, and many others. They indicate the type of group or institution to which the site belongs.

In an Access database, what is table design view used for?

Table design view is used to create the actual structure of all tables in the database.

What is the Internet Protocol (IP) part of TCP/IP responsible for?

The lower layer, Internet Protocol, is responsible for assigning an address to each packet so that it gets to the right destination.

What is the function of a domain name server?

The primary function of a DNS is to translate the URL or web address a user enters in a web browser, into the correct corresponding IP address.

What is the purpose for cookies?

The primary purpose of cookies is to keep a record of user information so that when returning to a website it is not necessary to retype your user name, password, and other information that rarely changes.

A __________ is a query that retrieves information from more than one related table.

multi-table query

A __________ is any active electronic device that is attached to a network, and is capable of sending, receiving, or forwarding information over a communications channel.

node

A __________ensures that only numbers are entered.

numeric check

Describe the process of a cascading delete.

orphaned record

Splitting packets of data is referred to as __________.

packet segmantation

Any server machine makes its services available to the Internet using numbered __________, one for each service that is available on the server.

ports

A __________examines the data typed into two different fields to determine identical entrie

range check

A __________verifies that the entered data falls within a certain range.

range check

A __________ stores data in tables that are related to other tables within the database.

relational database

Tables are sometimes referred to as _____________. Explain a limitation of a flat file database model.

relations

A __________ is a way of formally defining how two tables are related to each other by telling the database on which fields they are joined.

relationship

Rows are sometimes referred to as __________.

tuples

An __________ is one that is always connected to the Internet.

Always-on connection

A(n) __________ is a software application that enables computer users to locate and access web pages.

A (web browser)

What type of connection describes the figure below?

Cable

______ can be defined as hardware, networks, storage, services, and interfaces combined to deliver aspects of computing as a service. Cloud computing is a type of environment where your software and hardware can be hosted by a third party.

Cloud computing

What are the two goals of the normalization process?

(1) eliminating redundant data (e.g., storing the same data in more than one table) and (2) ensuring data dependencies make sense (e.g., only storing related data in a table).

Explain a limitation of a flat file database model.

A flat file database model can only store information relating to one entity, such as a customer or an order. If you want to view a customer's order, you are forced to open two distinct files—customer and order.

Although data can be entered into a database table via datasheet view, what is the primary method of entering data into a database?

A form

Distinguish between a null value and a zero (0).

A null value is an empty value. A zero represents a value; however, a blank or nothing is a null value.

Explain the purpose of a primary key in a table.

A primary key (PK) is used to uniquely identify each record. The PK should be a field such as StudentID, CustomerID, or OrderID.

Explain the function of a router.

A router is a specialized computer that connects two or more networks. The primary function of a router is to take incoming packets, analyze the packets, then route or send the packets to their correct destination.

What is a virtual private network (VPN)?

A virtual private network (VPN) is a type of private network built over public infrastructure. VPNs are a common choice for telecommuters (employees who work from home) to securely connect to the company network.

Explain how a web server works.

A web server is a computer that delivers (serves) content, such as web pages, using HTTP over the Internet. A web server is equipped with special software enabling the server (hardware) to send back the requested content to the client that requested it.

Explain the difference between a Podcast and a Webcast.

A webcast differs from a podcast because the recorded event usually includes live spectators in addition to an online audience. Webcasts might also include tools for audience interaction. Typically, Podcasts are a series of new installment, which can be received by subscribing to the Podcast.

What is the difference between a new window and a new tab?

A window can consist of many tabs. If you have a browser window open, and open a "New Tab," a new tab will be spawned in the same browser window. However, if you open a new window, this new window will be completely independent of the previous window.

What is the function of a table index?

An index is a data structure setup in a table that provides quick access to rows in a table based on the values in one or more columns (the index key). This allows for faster searching for finding values rather than scanning the entire table row by row.

A __________ is a Web site that consists of a series of entries arranged in reverse chronological order, often updated frequently with new information about particular topics.

Blog or Weblog

______ refer(s) to high-speed Internet access that is always on and faster than traditional dial-up access.

Broadband

What is broadband?

Broadband refers to high-speed Internet access that is always on and faster than traditional dial-up access

Describe and provide examples of four types of E-commerce.

Business-to-Business (B2B) describes commerce transactions between businesses, as in business between a manufacturer and a wholesaler, or between a wholesaler and a retailer. Examples of B2B are Dell computers and Microsoft software. Dell purchases software licenses to install on their computers that create a business relationship between Dell and Microsoft. Business-to-Consumer (B2C) sells products or provides services to consumers directly. Amazon.com is the most famous B2C e-commerce site. Consumer-to-Consumer (C2C) is e-commerce communication between consumers, but through a third platform. Take www.ebay.com, for example, where the consumers post their own items on this site for sale and wait for other consumers to bid on and then purchase them. The third platform eBay simply charges a flat fee or commission from these consumers. Mobile commerce (m-commerce) is the practice of conducting financial and promotional activities with the use of a wireless handheld device. Google Wallet is a mobile payment system developed by Google that allows users to store debit and credit cards and to redeem sales promotions using their mobile phone.

_________ are simply restrictions on the information to be retrieved.

Criteria

Describe the concept of data integrity.

Data integrity refers to the validity of the data contained in a database. Data integrity can be compromised in many ways, including typing errors during data entry, hardware malfunctions, and data transmission errors.

__________ are associated with fields and describe the type of data a field will store.

Data types

What is data validation?

Data validation is a technique used in databases to ensure valid data are entered into the database

Why is dial-up still used?

Dial-up is cheaper than Broadband connections and is widely available.

When is the primary key for a field typically assigned?

During the creation of a table

What is E-commerce?

E-commerce is the selling of goods and services over the Internet.

A table can be 2NF without achieving 1NF.

False (A table must first be 1NF)

An IP address is an agreed-upon format for transmitting data between two devices.

False (Protocol)

Cable operates over standard copper telephone lines like dial-up service, but is many times faster than dial-up.

False. DSL

Which type of Internet connection has faster data transfer rate than cable and DSL?

Fiber optic

When creating a field, you can set the field size to store a predefined number of characters, where would the field size be set?

Field properties

_________ are used to describe and store a piece of data, and __________ are composed of a group of related fields.

Fields; records

What will be the result of this query? Select FirstName, LastName From Students Where LastName = "Smith";

First and last name of all students who have the last name "Smith"

List the four rules a table must adhere to in order to be in 1NF.

For a database to be in first normal form (1NF), the following rules have to be met for each table in the database. There are no columns with repeated or similar data. Each data item cannot be broken down any further. For instance, the address field should not contain 623 East 68th St. Apt 3D. This data is not atomic, broken down to its lowest level. The address should be divided as follows: Address (623 East 68th St.), Apt Number (3D). Apt should have its own separate field. Each row is unique—that is, it has a primary key. Each field has a unique name.

_________ provide a tool for data input into the database.

Forms

What is the protocol Hypertext Transfer Protocol (HTTP) used for?

HTTP, which stands for Hypertext Transfer Protocol, is the protocol used to exchange information over the Web.

A ______________________ is commonly used in home computing where users can share resources, including an Internet connection.

Home area network (HAN)

__________ is the primary language that is used to developer websites.

Hypertext Markup Language (HTML)

Describe the process of a cascading update.

If the primary key for a record in the parent table changes, all corresponding records in the child tables will be modified.

__________ and __________ are typically used by client applications for receiving messages. are protocols typically used by client applications for receiving messages.

Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)

_________ are questions that you ask about your data.

Queries

_________ is a database concept that states the table relationships must always be consistent, and any foreign key field must agree with the primary key that is referenced by the foreign key. Therefore, any primary key field changes must be applied to all foreign keys, or not at all.

Referential integrity

What is relationship cardinality?

Relationship cardinality refers to the number of entity instances involved in the relationship. For example: one CUSTOMER may place many CUSTOMER ORDERS just as many STUDENTS may sign up for many CLASSES, and one EMPLOYEE receives one PAYCHECK.

__________ are used to display data and allow you to show summary information such as subtotals, totals, and percentages for groups of records and organize your data in a polished, professional presentation.

Reports

_______ is a standard language for accessing and manipulating data in databases.

SQL

Which type of Internet connection is best if you live in a remote region?

Satellite

A __________ is software that is designed to search for information on the Web.

Search engine

Users receive and send email using the __________, which is an Internet standard for email.

Simple Mail Transfer Protocol (STMP)

__________ sites focus on connecting people and organizations that share a common interest or activity.

Social networking

How do you know what data type to assign?

This is most likely discovered during the requirements gathering process by the business analyst. Then it is up to the BA or data modeler to use the correct data type.

FTP (File Transfer Protocol) is responsible for the transmission of files between computers.

True

The browser history is list of the web pages the user has recently visited.

True

A __________ is the global address of documents and other resources on the Web.

Uniform Resource Locator (URL)

Explain the difference between Webmail and an Email client.

Webmail is access through the Web. You do not need client software on your machine. An email client is a program that is installed on your computer that interacts with remote email servers to download and send email. An example of this is Microsoft Outlook, or simply Outlook.

What is Webmail?

Webmail is an application that is used on the Internet via a browser. An example of Webmail is Gmail.

An __________ is a record that has no parent relation.

When rows in the parent table are deleted, the matching foreign key columns in the child table are also deleted.

Explain the difference between Wi-Fi and 4G.

Wi-Fi uses radio waves to connect to the Internet using a wireless router. 4G is a cellular method for connecting to the Internet.

What are three elements of Web 2.0?

Wikis, Mobile devices, and Social networking

What is workgroup computing?

Workgroup computing is a collection of individuals working together on a task, using computers connected to a network that allows them to send emails to one another, share files, and schedule meetings.

How do you solve the problem of a many-to-many relationship?

You solve the many-to-many relationship problem by creating an intermediary table (sometimes referred to as a junction, joining, or linking table) that contains the primary keys from each of the two tables, thus creating a one-to-many relationship between each table and the intermediary table.

A(n) __________ ensures that only alphabetic data (the letters of the alphabet) are entered in a field.

alphabetic check

Fields are sometimes referred to as _____________.

attributes

A __________ is a computer that requests information from the server, also referred to as a host computer.

client

A __________ determines whether a required field has been left empty. For example, when filling out a form online, the last name cannot be blank.

completeness check

A __________ is a set of software programs that allows users to create, edit, and update data in database files; and store and retrieve data from those database files.

database management system (DBMS)

A ________________ is a computer on the network that is responsible for translating domain names into the correct IP addresses.

domain name server (DNS)

A(n) __________ is a node that allows you to gain entrance into a network.

gateway

A __________ relationship exists between a pair of tables if a single record in the first table can be related to one or more records in the second table, and a single record in the second table can be related to one or more records in the first table.

many-to-many

_________ is a relationship where each record in the first table has only one related record in the second table.

many-to-many


Kaugnay na mga set ng pag-aaral

Progression: Field Tech III - IV Conventional

View Set

US History B - Era of Cultural Change (Unit #4)

View Set

AP World History Period 4: Global Interactions (c. 1450 to c. 1750)

View Set

Understanding Numbers in Development

View Set

CHAPTER 11: Rhyming Singers of the Bahamas, "My Lord Help Me to Pray"

View Set

Spanish Influence in the United States

View Set

Mod 6 Week 23 Quiz Review (Language Arts)

View Set

Lewis Ch 47: Assessment of the Endocrine System

View Set