Exam 9: Data Design
Exam 1: Introduction to Systems Analysis and Design76 Questions
Exam 2: Analyzing the Business Case80 Questions
Exam 3: Managing Systems Projects80 Questions
Exam 4: Requirements Engineering79 Questions
Exam 5: Data and Process Modeling69 Questions
Exam 6: Object Modeling76 Questions
Exam 7: Development Strategies80 Questions
Exam 8: User Interface Design74 Questions
Exam 9: Data Design74 Questions
Exam 10: System Architecture80 Questions
Exam 11: Managing Systems Implementation74 Questions
Exam 12: Managing Systems Support and Security80 Questions
Exam 13: Communication-Tools45 Questions
Exam 14: Case-Tools45 Questions
Exam 15: Financial-Analysis-Tools45 Questions
Exam 16: Internet-Resource-Tools44 Questions
Select questions type
Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.
(True/False)
4.8/5
(43)
A _____,which is not unique,is a field or combination of fields that can be used to access or retrieve records.
(Multiple Choice)
4.9/5
(35)
Systems that interact with a DBMS are relatively independent of how the physical data is maintained.
(True/False)
5.0/5
(36)
Any field that is not a primary key or a candidate key is called a _____.
(Multiple Choice)
4.7/5
(36)
The three normal forms constitute a progression in which second normal form represents the best design.
(True/False)
4.9/5
(40)
A schema is a set of letters or numbers that represents a data item.
(True/False)
4.7/5
(44)
A(n)_____ is a collection of tools,features,and interfaces that enables users to add,update,manage,access,and analyze data.
(Multiple Choice)
4.9/5
(38)
The basic elements of logical storage are alphabetic or numeric characters,such as the letter A or the number 9.
(True/False)
4.8/5
(30)
_____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.
(Multiple Choice)
4.8/5
(28)
A table is in _____ if it does not contain a repeating group.
(Multiple Choice)
4.8/5
(40)
_____ means that a system can be expanded,modified,or downsized easily to meet the rapidly changing needs of a business enterprise.
(Multiple Choice)
4.8/5
(41)
_____,a coding method that uses one byte per character,is used on mainframe computers and high-capacity servers.
(Multiple Choice)
4.8/5
(30)
Encryption is the process of creating table designs by assigning specific fields or attributes to each table in the database.
(True/False)
4.9/5
(30)
Some abbreviation codes are called _____ codes because they use a specific combination of letters that are easy to remember.
(Multiple Choice)
4.8/5
(36)
A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form.
(Multiple Choice)
4.8/5
(37)
In an entity-relationship diagram,entities are commonly represented as _____.
(Multiple Choice)
4.9/5
(40)
A _____ is a set of letters or numbers that represents a data item.
(Multiple Choice)
5.0/5
(33)
_____ is designed to serve the needs of a specific department,such as sales,marketing,or finance.
(Multiple Choice)
4.9/5
(37)
Showing 41 - 60 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)