Exam 7: Databases in Applications
Exam 1: The Database Environment and Development Process119 Questions
Exam 2: Modeling Data in the Organization102 Questions
Exam 3: The Enhanced E-R Model102 Questions
Exam 4: Logical Database Design and the Relational Model101 Questions
Exam 5: Introduction to SQL102 Questions
Exam 6: Advanced SQL95 Questions
Exam 7: Databases in Applications93 Questions
Exam 8: Physical Database Design and Database Infrastructure167 Questions
Exam 9: Data Warehousing and Data Integration150 Questions
Exam 10: Big Data Technologies69 Questions
Exam 11: Analytics and Its Implications32 Questions
Exam 12: Data and Database Administration With Focus on Data Quality66 Questions
Exam 13: Distributed Databases100 Questions
Exam 14: Object-Oriented Data Modeling104 Questions
Select questions type
A client PC that is responsible for processing presentation logic, extensive application and business rules logic, as well as many DBMS functions is called a:
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
D
Loss of confidentiality is a threat that involves outside parties using information to embarrass a company.
Free
(True/False)
4.9/5
(30)
Correct Answer:
True
What threats to data security must be addressed in a comprehensive data security plan?
Free
(Essay)
5.0/5
(32)
Correct Answer:
A comprehensive data security plan must address the following threats:
1. Accidental losses, which could be caused by human error, software and hardware-caused breaches
2. Theft and fraud
3. Loss or privacy or confidentiality
4. Loss of data integrity
5. Loss of availability
________ is the process of assigning pieces of application code to clients or servers.
(Multiple Choice)
4.8/5
(37)
A data-interchange format easily for humans to read and machines to parse and process is called:
(Multiple Choice)
4.8/5
(33)
ODBC is an application programming interface that provides a common language for application programs to access and process an SQL database independent of the particular RDBMS that is accessed.
(True/False)
4.9/5
(27)
The client/server architectures that have evolved can be distinguished by the distribution of ________ across clients and servers.
(Multiple Choice)
4.8/5
(36)
How the database results are read into memory is determined by:
(Multiple Choice)
4.9/5
(34)
Application partitioning gives developers the opportunity to write application code that can later be placed on either a client workstation or a server, depending upon which location will give the best performance.
(True/False)
4.8/5
(42)
What are the most important security features for data management software?
(Essay)
5.0/5
(26)
Security measures for dynamic Web pages are different from static HTML pages because:
(Multiple Choice)
4.9/5
(37)
Loss of data integrity means that someone has stolen data from the database server.
(True/False)
4.7/5
(33)
Since dynamic Web pages require full access to the database, security is different from static HTML pages.
(True/False)
4.9/5
(31)
A client PC that is responsible for processing presentation logic, extensive application and business rules logic, and many DBMS functions is called a(n):
(Multiple Choice)
4.8/5
(25)
Showing 1 - 20 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)