is midterm 2
A (bring your own device) BYOD policy is a statement concerning employees' permissions and responsibilities when they use their own device for organizational business.
true
A line in an entity-relationship (E-R) diagram is used to represent the relationships between two entities.
true
An operating system is a program that controls a computer's resources.
true
Databases that have both primary and foreign keys are called relational databases.
true
In the future, your house will be so smart it will analyze you.
true
It is to the users advantage to have a working knowledge of database developments.
true
Locking must be used to coordinate the activities of users in order to prevent the lost-update problem.
true
Native applications are developed by professional programmers only.
true
One of the functions of a DBMS is to provide tools to assist in the administration of a database.
true
Open source succeeds because of collaboration.
true
Reports refer to the structured presentation of data using
true
SQL is an international standard language for processing a database.
true
Some governments are launching their own cryptocurrencies.
true
The main memory of a computer is also called random access memory (RAM).
true
The rows in a database are also called ________. A.fields B.records C.laterals D.files E.tables
Answer: B. records
Disruptive forces that have the potential to disrupt business as we know it include all of the following EXCEPT __________. A.data mining applications B. self-driving vehicles C.3D printing D.cryptocurrencies E.Internet of Things
A.data mining applications
________ is the combination of the real physical world with interactive virtual images or objects. A.Mixed reality (MR) B.Reality C.Virtual reality (VR) D.Augmented reality (AR) E.Sense of presence
Answer: A. Mixed reality (MR)
________ is a completely computer-generated virtual world with interactive digital objects. A.Virtual reality (VR) B.Sense of presence C.Mixed reality (MR) D.Reality E.Augmented reality (AR)
Answer: A. Virtual reality (VR)
A computer that supports processing from many computers in other locations is called a __________. A.server farm B.server C.bit D.memory E.client
Answer: B. server
An important advantage of __________ is that the browser provides a generally consistent environment in which to execute. A.Web applications B.native applications C.open source applications D.closed source applications E. custom-developed applications
Answer: A. Web applications
The data and relationships that will be stored in a database can be depicted using __________. A.a data model B.attributes C.an entity D.minimum cardinalities E.identifiers
Answer: A. a data model
Which of the following is a purpose of "application programs"? A.Provide security, data consistency, and special purpose processing like handle out-of-stock situations B.Granting access to the users C.Search based upon data values provided by the user D.View data; insert new, update existing, and delete existing data E.Structured presentation of data using sorting, grouping, filtering, and other operations
Answer: A. Provide security, data consistency, and special purpose processing like handle out-of-stock situations
Which of the following is the smallest element in a database? A.byte B.metadata C.field D.zetta E.record
Answer: A. byte
Which of the following is an advantage of employee use of mobile systems at work? A.Reduced support costs B.Loss of control C.Compatibility problems D.Greater support costs E.Data loss or damage
Answer: A. Reduced support costs
Which of the following is TRUE about the database development process? A.The database structure is easy to change during the data modeling stage. B.Changing a relationship from 1:N to N:M in an existing database is a complex and lengthy process. C.User review of the data model is avoided as it is not helpful in data modeling. D.Databases are easier to develop than spreadsheets. E.Normalization is unnecessary for large databases.
Answer: A. The database structure is easy to change during the data modeling stage.
Web applications are characterized by which of the following? A.They can be run on multiple operating systems without modifications. B.They can run only on a single type of device. C.They are highly secure and easy to use. D.They can use the unique capabilities of the hardware device. E.They are expensive to develop and support.
Answer: A. They can be run on multiple operating systems without modifications.
Which of the following statements is TRUE about native applications? A.They only run on the operating system for which they are programmed. B.The cost of native applications is low. C.The limits on native applications are usually technological, not budgetary. D.They are run exclusively through a Web browser. E.They can be developed by less skilled, lesser-paid employees.
Answer: A. They only run on the operating system for which they are programmed.
What is cardinality? A.It helps to describe the relationship between two entities. B.It corrects and makes the data effective. C.It is the process of creating a representation of data. D.It defines the foreign keys of a table. E.It is the process by which tables are redesigned.
Answer: A. It helps to describe the relationship between two entities.
Which of the following tasks cannot be performed using a list but can be managed through databases? A.To keep track of student registration B.To delete C.To store the grades of students D.To perform some calculations like addition and subtraction E.To modify the data that is already present
Answer: A. To keep track of student registration
Which of the below defines an identifier? A.It is an attribute or group of attributes whose value is associated with one and only one entity instance. B.It describes characteristics of the entity. C.It is something that a user wants to track. D.It is basically a form of an entity-relationship data model. E.It may represent a physical object, logical construct, or transaction.
Answer: A. It is an attribute or group of attributes whose value is associated with one and only one entity instance.
Which of these is an open source operating system? A.Linux B.Firefox C.Windows 10 D.Open Office E.iOS
Answer: A. Linux
________ in an E-R diagram refer to the least number of entities required in a relationship. A.Minimum cardinalities B.Minimum candidate keys C.Chernozem cardinalities D.Primary keys E.Foreign keys
Answer: A. Minimum cardinalities
Which of the following is NOT correct regarding browser-based database applications? A. Browser-based applications are thick-client applications. B.Languages like C# and Java are used for server-side processing. C. Forms, reports, and queries are displayed and processed using HTML. D. Browser-based applications are thin-client applications. E.JavaScript is the standard language for user-side processing.
Answer: A. Browser-based applications are thick-client applications.
________ are digital-only currencies. A.Cryptocurrencies B.Debit cards C.Online payments D. E-checks E. E-wallets
Answer: A. Cryptocurrencies
Which of the following is the most controlling BYOD policy? A.For an organization to declare that it owns any device that employees connect to its network. B.The company creates special logins for BYOD. C.For the company to offer coffee shop style networking. D.If the employee signs on to the company's network, they are financially responsible for any damage done. E.For the organization to sniff employees' mobile traffic.
Answer: A. For an organization to declare that it owns any device that employees connect to its network.
Which of the following is NOT an operation performed by a database developer? A.Grants access permission to a database B.Queries the table data C.Create relationships and other structures D.Create tables E.Modify an existing table
Answer: A. Grants access permission to a database
A primary key in a database is a ________. A.column or group of columns that identifies a unique row in a table B.group of tables or files formed to identify a unique field or row C.group of rows that identifies a unique table or file D.group of records that identifies similar attribute E.group of fields or columns that represent metadata
Answer: A. column or group of columns that identifies a unique row in a table
In a database, when data items are inaccurate and inconsistent with one another, it leads to a(n) ________. A.data integrity problem B.security problem C.adaptation conflict D.data loopback problem E. crow's-foot paradigm
Answer: A. data integrity problem
Columns that are keys to different tables than the ones in which they reside are called ________. A.foreign keys B.nonlocal keys C.primary keys D.attributes E.internal records
Answer: A. foreign keys
If two users of a database access the same record and both attempt to complete an update transaction with that record, the __________problem is likely to occur. A.lost update B.Web browsing C.transaction processing D.power surging E.processing
Answer: A. lost update
Which of the following is an example of storage hardware in computers? A.magnetic disk B.inkjet printer C.Web camera D.plotter E.projector
Answer: A. magnetic disk
Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________. A.mobile system B.native application C.client operating system D.nonmobile system E.virtual private network
Answer: A. mobile system
If a list deals with one theme but is long, put it into a __________. A.spreadsheet B.single list C.separate column D.database column E.cell
Answer: A. spreadsheet
Server infrastructure is delivered as a service via the Internet and often referred to as ________. A.the cloud B.main memory C.computer hardware D.SSD storage E.secondary memory
Answer: A. the cloud
Web applications are characterized by which of the following? A.They can run only on a single type of device. B.They can use the unique capabilities of the hardware device. C.They are expensive to develop and support. D.They can be run on multiple operating systems without modifications. E.They are highly secure and easy to use.
Answer: D. They can be run on multiple operating systems without modifications.
Which of the following is TRUE of N:M relationships? A.They are also called one-to-many relationships. B.They are the same as N:N relationships. C.They connect different data types. D.They can have more than one entity on each side of the relationship. E.They represent minimum cardinalities in a relationship.
Answer: D. They can have more than one entity on each side of the relationship.
Which of the following statements refers to server virtualization? A.a server can connect to multiple networks at the same time B.a storage area that loses its contents when the power is off C.a personal computer, such as a desktop or portable computer, that hosts several different operating systems D.a server computer that hosts one or more other server computers E.a server that hosts many versions of desktop operating systems
Answer: D. a server computer that hosts one or more other server computers
A database __________ is a collection of forms, reports, queries, and application programs. A.metadata B.function C.relationship D.application E.field
Answer: D. application
Melissa is a senior accountant at a consulting firm. She brings to her manager's notice the considerable amount of time that is wasted when accounting tasks are performed manually, and proposes that the department automates these tasks. Melissa's accounting department is in need of a(n) ________. A.operating system B.firmware C.system software D.application software E.network connection
Answer: D. application software
Bits are grouped into 8-bit chunks called ________. A.switches B.nibbles C.kilobytes D.bytes E.strings
Answer: D. bytes
A database is used instead of a spreadsheet when ________. A.lists of data involve a single theme B.lists involve data with multiple themes C.structures of data lists are simple D.users have a small amount of data to store E.users do not want to store all data in one place
Answer: B. lists involve data with multiple themes
Browser applications are thin-client applications that ________. A.use COBOL as the standard language for user-side processing B.need not be preinstalled on the users' computers C.do not need to be encrypted D.are processed using VisualBasic and C++ E.depend on internal networks and not the Internet to transmit data
Answer: B. need not be preinstalled on the users' computers
The program that controls the computing device's resources is termed the __________. A.controller B.operating system C.application system D.main memory E.firmware
Answer: B. operating system
Every database table must have a __________, a field (or fields) that contains a unique value for every table record. A.primary element B.primary key C.relationship line D.predictive key E.foreign key
Answer: B. primary key
The angled lines on the lines representing relationship between two related entities are referred to as ________. A.foreign keys B.entities C.identifiers D. crow's feet E.switch
Answer: D. crow's feet
Maria creates a relational database to keep track of cars in her repair shop. She stores information about each car in the "vehicle" table, and creates a column labeled "vehicle_ID" where she stores the vehicle VIN number. The "vehicle_ID" column is referred to as a ________. A.secondary key B.primary key C.functionally dependent record D.key attribute E.foreign key
Answer: B. primary key
The elements that make up a database application are: forms, application programs, reports, and __________. A.relationships B.queries C.data views D.backups E.performance monitors
Answer: B. queries
________ reality is the altering of reality by overlaying digital information on real-world objects. A.Enhanced B.Augmented C.Virtual D.Actual E.Mixed
Answer: B. Augmented
The DBMS does not provide applications for which operation? A.Deleting data B.Automatically correcting data C.Inserting data D.Reading data E.Modifying data
Answer: B. Automatically correcting data
Which of the following is a characteristic of volatile memory? A.Processing of data is very slow. B.Contents are lost when power is off. C.It should be purged at least once a year. D.Files are stored permanently. E.Processor heats up during the operation.
Answer: B. Contents are lost when power is off.
Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device? A.3D printing B.Internet of things (IoT) C.automated guided vehicles D.visual mapping E. self-driving cars
Answer: B. Internet of things (IoT)
________ is a version of Unix that was developed by an open source community. A.Symbian OS B.Linux C.Android D.SPX E.Mac OS
Answer: B. Linux
Which of the following is TRUE of single-user databases? A.They are displayed and processed using HTML5, CSS3, and JavaScript B.The application, the DBMS, and the database all reside on the user's computer. C.The Internet is used to access the DBMS server computer. D.They run on clustered Linux or Unix systems E.They use JavaScript for user-side processing.
Answer: B. The application, the DBMS, and the database all reside on the user's computer.
When using the relational model to represent two tables, one must ________. A.have more than two primary keys in the model B.add a foreign key to one of the tables C.minimize the number of columns in the second table D.establish only N:M relationships between the tables E.use metadata instead of foreign keys
Answer: B. add a foreign key to one of the tables
Bits are used for computer data because they ________. A.represent the orientation of a nonoptical media B.are easy to represent physically C.can have more than two values at a time D.have an infinite number of states E.are represented exclusively as letters of the alphabet
Answer: B. are easy to represent physically
A(n) ________ is a program used to create, process, and administer a database. A.operating system driver B.database management system C.information system D.operating system E.database system
Answer: B. database management system
In a data model, a(n) ________ is something that a user wants to track. A.record B.entity C.quark D.primary key E.byte
Answer: B. entity
The major elements in a mobile system include all the following EXCEPT __________. A. cloud-based resources B. in-place users C.users in motion D.wireless connectivity E.mobile devices
Answer: B. in-place users
All of the following are benefits to using cryptocurrencies except ________. A.there are no taxes B.it is insured by the Federal Reserve Bank C.it is faster and easier to use than traditional payment methods D.there is protection from inflation E.it cannot be seized by the government
Answer: B. it is insured by the Federal Reserve Bank
Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a powerful antivirus program. When Toby buys the program, he will actually be buying the software ________. A.code B.license C.copyright D.patent E.trademark
Answer: B. license
The designers of a database typically begin by developing a __________ to construct a logical representation of the database before it is implemented. A.network diagram B.3D representation C.process model D.data model E.line drawing
Answer: D. data model
The CPU stores the results of computations in ________. A.floppy disks B.SSD storage C.secondary memory D.main memory E.network cards
Answer: D. main memory
In an E-R diagram, a line between two entities represents a(n) ________. A.attribute B.branch C.cardinality D.relationship E.identifier
Answer: D. relationship
Which of the following terms refers to a collection of servers? A.firmware B.server database C.shareware D.server farm E.parallel nodes
Answer: D. server farm
Which of the following notations in an E-R diagram means that the entity is optional and a relationship need not have an entity of that type? A.arrow B.double line C.vertical bar D.small oval E.triangle
Answer: D. small oval
Users in motion require all the following cloud resources EXCEPT __________. A.application code B.data sources C.email service D.wireless connectivity E.Web sites
Answer: D. wireless connectivity
Mobile systems offer the potential of ________, which is data delivered to the user at the precise time it is needed. A.clean data B.cluster data C. just-in-time data D.granular data E.convenient data
Answer: C. just-in-time data
A data model is a ________. A.collection of isolated databases B.array of data variables C.logical representation of database data D.repository of unprocessed data E.set of programs used to retrieve data
Answer: C. logical representation of database data
A ________ is equivalent to 1,024 kilobytes. A.gigabyte B.kilobyte C.megabyte D.terabyte E.zettabyte
Answer: C. megabyte
If a database table contains redundant or duplicate data, it can be converted into two tables with better structure through __________. A.creating relationships B.data integrity C.normalization D.cardinality E.data modeling
Answer: C. normalization
Main memory is also known as ________. A.the system bus B. read-only memory C.random access memory D.optical memory E.cache memory
Answer: C. random access memory
All the following are characteristics of native applications EXCEPT __________. A.distributed via a company store web site (such as iTunes) B.developed in complex, sophisticated programming languages C.runs seamlessly on any device under the browser D.developed by skilled professional programmers E.high development cost
Answer: C. runs seamlessly on any device under the browser
The process of normalization constructs tables such that every table has a ________. A. one-to-one relationship between entities B.minimized metadata footprint C.single theme D.foreign key E.specialized graphical query
Answer: C. single theme
In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required. A.triangular block B.arrow C.vertical bar D.wave E.small oval
Answer: C. vertical bar
Which of the following BYOD policies is likely to be used in a workplace that must maintain strict security standards? A. "We'll check it out, reload software, and then manage remotely." B. "We'll offer limited systems you can access from any device." C. "If you connect it, we own it." D. "We'll be a coffee shop." E. "You're responsible for damage."
Answer: C. "If you connect it, we own it."
________ is the altering of reality by overlaying digital information on real-world objects. A.Reality B.Virtual reality (VR) C.Augmented reality (AR) D.Sense of presence E.Mixed reality (MR)
Answer: C. Augmented reality (AR)
Which of the following statements about client and server computers is correct? A.Servers are less powerful than clients. B.A tablet is an example of a server. C.Clients place requests with servers and servers return data. D.Clients are organized in farms, but servers can be located only in the cloud. E.Servers use the services that clients provide through a network.
Answer: C. Clients place requests with servers and servers return data.
________ is the process of converting a data model into tables, relationships, and data constraints. A.Database aggregation B.Data mining C.Database design D.Database cross modeling E.Database querying
Answer: C. Database design
________ applications are programs that are written to use a particular operating system. A. Thin-client B.Enterprise C.Native D.Browser E.Web
Answer: C. Native
Popular, successful open source software products include all of the following EXCEPT __________. A.Firefox B.MySQL C.Oracle D.Android E.Hadoop
Answer: C. Oracle
Which of the following is an international standard language for processing a database? A.Cassandra B.Relational LM C.SQL D.DB2 E.MS Access
Answer: C. SQL
________ are the final judges as to what data the database should contain and how the records in that database should be related to one another. A.Auditors B.Administrators C.Users D.Designers E.Developers
Answer: C. Users
Which of the following is likely to occur in the future? A.Workers will still need to go in to work to access data. B.Web applications will disappear. C.Your car knows exactly when to self-start so it is warm when you get in. D.Future jobs will require less technical skills. E.Students no longer need to cultivate personal creativity and problem-solving skills.
Answer: C. Your car knows exactly when to self-start so it is warm when you get in.
A group of similar rows or records is known as ________. A.a cluster B.a field C.a table D.an attribute E.a prototype
Answer: C. a table
Browser-based applications ________. A.run within a corporate network that is protected from the Internet B.need to be preinstalled on the users' computers C.are more vulnerable to security threats than are traditional applications D.do not need to be encrypted E.eliminate the need to check for data consistency
Answer: C. are more vulnerable to security threats than are traditional applications
Computers represent data using __________. A.flashes B.functions C.binary digits D.elements E.unary digits
Answer: C. binary digits
Web applications are typically limited by the capabilities of the ________. A.programming language B.motherboard C.browser D.hardware E.operating system
Answer: C. browser
A ________ is also called "the brain" of the computer. A.motherboard B.thumb drive C.central processing unit D.network card E.CMOS
Answer: C. central processing unit
Identify the first step in transforming a data model into a relational database design. A.creating data triggers for export B.creating foreign keys C.creating a table for each entity D.normalizing the data and files E.representing the entity relationships
Answer: C. creating a table for each entity
Data integrity problems are likely to occur when __________. A.attribute conflicts are not resolved B.the data design has a N:M relationship C.data is duplicated D.normal forms are used E.minimum cardinalities are not met
Answer: C. data is duplicated
Metadata is/are ________. A.error logs of databases B.data that are encrypted C.data that describes data D.codes used for server-side processing E.more important data
Answer: C. data that describes data
A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. A.data bridge B.database design C.database application D.data model E.data field
Answer: C. database application
In data modeling, a(n) __________ is something that the users want to store data about. A.relationship B.primary key C.entity D.foreign key E.attribute
Answer: C. entity
Each entity in a database has a unique attribute called a(n) ________. A.public key B.index field C.identifier D.foreign key E.prime value
Answer: C. identifier
When you state a business rule that pertains to your organization, such as "At my university, a student must declare a major," you are actually defining the __________ of the relationship between students and majors. A.relational limits B.foreign keys C.normality D.maximum cardinality E.minimum cardinality
Answer: E. minimum cardinality
Virtualization is the process by which ________. A.many computers are used to control a server B.a single operating system is shared by multiple users C.a single server is used to host the operations of a workstation D.a single operating system is licensed for multiple computers E.one physical computer hosts many different virtual computers within it
Answer: E. one physical computer hosts many different virtual computers within it
Which of the following devices is an example of a storage hardware device? A.barcode scanner B.central processing unit C.random access memory D.the system bus E.optical disk
Answer: E. optical disk
The modification or deletion of data in a database is an example of ________ operations of a database management system. A.technical B.statistical C.administrative D.analytical E.processing
Answer: E. processing
The three essential elements of the definition of a database are __________. A. fields; relationship among fields in tables; metadata B.validation rules; data; tables C. tables; relationship among rows in tables; validation rules D. tables; metadata; validation rules E. tables; relationship among rows in tables; metadata
Answer: E. tables; relationship among rows in tables; metadata
All of these issues are results of data integrity problems except ________, A.the system will develop a poor reputation B.users lose confidence in the data C.inconsistent results D.incorrect results E.the system will give users too much information
Answer: E. the system will give users too much information
________ is the process of converting a poorly-structured table into two or more well-structured tables. A.Optimization B.Banding C.Standardization D.Normalization E.Refactoring
Answer: D. Normalization
Which job will NOT be considered to be the hot job in the future? A. Dev-Ops manager B.Marketing technologist C.Big data architect D. PL/SQL developer E.IOT architect
Answer: D. PL/SQL developer
__________ is an international standard language for processing a database. A.RDBMS B.PHP C.HTML D.SQL E.DB2
Answer: D. SQL
Which of the following statements is true? A. "If the structure of a list is simple enough, it will be necessary to use database technology." B. "Professionals rarely use spreadsheets to keep track of things." C. "Databases are not used to keep track of things." D. "If the structure of a list is simple enough, there is no need to use database technology." E. "Setting up different forms of data in separate spreadsheets is an effective way to keep track of that data."
Answer: D. "If the structure of a list is simple enough, there is no need to use database technology."
Which of the below is a mobile operating system? A.Mac OS B.Windows Server C.Unix D.Android E.Linux
Answer: D. Android
The DBMS does not provide applications for which operation? A.Modifying data B.Deleting data C.Inserting data D.Automatically correcting data E.Reading data
Answer: D. Automatically correcting data
Which of the following statements about software is true? A.Organizations make a lot of money selling licenses to open source software. B.It is perfectly fine for an organization to buy one copy of a software product and copy it on to all its computers. C.Operating systems for clients and servers is identical. D.Buying software means you own a license to use the software. E.Buying software means you own the software code.
Answer: D. Buying software means you own a license to use the software.
Which of the following is a Web-based programming language? A. C# B. Objective-C C. C++ D.CSS3 E.VB.net
Answer: D. CSS3
Which of the following statements is correct? A.The user does not need to dedicate special time to reviewing the data model. B.If corrections are needed in the database structure, the requirements step is the best time to do this. C.A database is a model of how only managers view their business world. D.Do not proceed with database design unless the data model is accurate. E.If the data model is incorrect, the database can still be used successfully.
Answer: D. Do not proceed with database design unless the data model is accurate.
Which feature does not qualify a phone to be a smart phone? A.More memory B.A phone that has more processing power C.Ability to interconnect with other devices D.Having good voice quality E.Internet and Wi-Fi access
Answer: D. Having good voice quality
The __________ will allow all the devices in your home to be connected and will enable it to see what, how, and when you do things and anticipate your needs. A.capacity of 3D printing B.advances in self-driving cars C.relaxation of BYOD policies D.Internet of Things E.improvements in vertical-market software
Answer: D. Internet of Things
Which of the following is NOT a major element of a mobile system? A.Mobile devices B.Users in motion C. Cloud-based resource D.Light laptops E.Wireless connectivity
Answer: D. Light laptops
Which of the following is NOT a valid type of relationship? A. One-to-many B. One-to-one C. Many-to-many D. None-to-none E. Many-to-one
Answer: D. None-to-none
All of the following are disruptive forces to change business except ________. A.digital reality devices B.cryptocurrencies C. self-driving cars D.Internet of Things E.2D printing
Answer: E. 2D printing
Which of the following is NOT a capability of mobile device management (MDM) software? A.Restoring a device. B.Reporting usage of the device. C.Install and update software. D.Perform a back-up of the device. E.Automate sending of text messages on behalf of the user.
Answer: E. Automate sending of text messages on behalf of the user.
Carter is the Web designer for an open source project. He has created a program that facilitates the easy collation of data for a large-scale logistics firm. Which of the following is TRUE of the source code for Carter's program? A.It is available only to carefully vetted contractors. B.It is highly protected and obtained only by having a license. C.It is less stable and platform dependent. D.It cannot be compiled. E.It is available to the public.
Answer: E. It is available to the public.
What is the main feature of metadata? A.It contains only the primary keys. B.It stores all the data from tables. C.It contains only the foreign keys. D.It contains the column definition. E.It is the data about data.
Answer: E. It is the data about data.
Which of the following is NOT a resource found in the cloud? A.Application code B.Web sites C.Email and IM services D.Data sources E.Mobile device
Answer: E. Mobile device
Why is user involvement critical for database development? A.Because they use the system. B.Because users design the system. C.The executive board says it is critical. D.The data model states it is important. E.The design of the database depends on how users view their business environment.
Answer: E. The design of the database depends on how users view their business environment.
Entities in a data model have ________ that describe the characteristics of the entity. A.characters B.codes C.primary keys D.scribes E.attributes
Answer: E. attributes
The limits on creating native applications are usually ________, not technological. A.based on requirements B.in finding skilled programmers C.based on an executive board decision D.based on complexity E.budgetary
Answer: E. budgetary
In a database, ________ are grouped into columns. A.files B.fields C.records D.nibbles E.bytes
Answer: E. bytes
A ________ describes the data and relationships that will be stored in a database. A.data application B. data-tree model C.data aggregator D.query model E.data model
Answer: E. data model
An organization has identified a new business process that will revolutionize its industry. To obtain the software that will be needed to support this business process, it will be necessary for the organization to __________. A.abandon the idea since no software exists B.buy a horizontal application off the shelf and customize it C.buy a one-of-a-kind application off the shelf D.buy a horizontal application off the shelf E.develop a one-of-a-kind application using custom development
Answer: E. develop a one-of-a-kind application using custom development
Which of the following is a developmental task of database administration? A.testing backup procedures B.managing configuration changes in systems C.monitoring backup procedures D.conducting training for users E.evaluating an application design
Answer: E. evaluating an application design
The columns in a database are also called ________. A.files B.verticals C.tables D.records E.fields
Answer: E. fields
Katrina is a sales representative for an online retailer. She needs to update her customer list with new contact information for five customers. Which of the following elements will help Katrina modify her data? A.operations B.reports C.triggers D.queries E.forms
Answer: E. forms
All of the following are functions of the DBMS except ________. A.providing tools to administer the database B.processing the database C.modifying the database D.creating the database E.getting the users to use the database
Answer: E. getting the users to use the database
The disadvantages of employees using their own mobile devices at work include all the following EXCEPT __________. A.compatibility problems B.greater support costs C.risk of infection D.loss of control E.greater employee satisfaction
Answer: E. greater employee satisfaction
The disadvantages of employees using their own mobile devices at work include all the following EXCEPT __________. A.compatibility problems B.loss of control C.greater support costs D.risk of infection E.greater employee satisfaction
Answer: E. greater employee satisfaction
The purpose of a database is to __________. A.eliminate the need to learn programming B.make the use of the cloud more straightforwardly C.eliminate the need to learn about spreadsheets D.keep track of things that share a single theme E.keep track of things that involve multiple themes
Answer: E. keep track of things that involve multiple themes
Current 3D printing technology __________. A.is unable to create objects with much strength B.is unlikely to affect existing industries significantly C.is basically focused on toy manufacturing D.can print in an array of materials E.is limited to plastic materials
D. can print in an array of materials
A DBMS and database are synonymous terms that can be used interchangeably.
false
A computer with two CPUs is called a(n) dual-core computer.
false
Cache memory is also called "the brain" of a computer.
false
Database design is easy and can be explained in a paragraph.
false
Managing the impact of database structural changes on applications and users is an operational task for a database administrator.
false
Most traditional databases use the Internet to transmit traffic back and forth between the users' computers and the DBMS server.
false
The accuracy of a database design is not dependent on the corresponding data model.
false
Web applications are programs that are written to use a particular operating system.
false