Exam 7: Databases in Applications
Exam 1: The Database Environment and Development Process119 Questions
Exam 2: Modeling Data in the Organization102 Questions
Exam 3: The Enhanced E-R Model102 Questions
Exam 4: Logical Database Design and the Relational Model101 Questions
Exam 5: Introduction to SQL102 Questions
Exam 6: Advanced SQL95 Questions
Exam 7: Databases in Applications93 Questions
Exam 8: Physical Database Design and Database Infrastructure167 Questions
Exam 9: Data Warehousing and Data Integration150 Questions
Exam 10: Big Data Technologies69 Questions
Exam 11: Analytics and Its Implications32 Questions
Exam 12: Data and Database Administration With Focus on Data Quality66 Questions
Exam 13: Distributed Databases100 Questions
Exam 14: Object-Oriented Data Modeling104 Questions
Select questions type
Three-tier architectures generally result in higher long-term costs.
(True/False)
4.8/5
(29)
Which of the following threats involves outside parties using information to embarrass a company?
(Multiple Choice)
4.8/5
(35)
A PC configured to handle user interfaces with limited local storage is called a(n):
(Multiple Choice)
4.7/5
(36)
All of the following are well-accepted characteristics of transactions EXCEPT:
(Multiple Choice)
4.8/5
(25)
The process of assigning parts of an application to a client or server is called application partitioning.
(True/False)
4.9/5
(51)
The architecture that most applications use that separates the business logic, presentation logic, and database logic is called:
(Multiple Choice)
4.8/5
(26)
Business rules logic includes such activities as data validation and identification of processing errors.
(True/False)
4.9/5
(32)
A business transaction requires several actions against a database.
(True/False)
4.8/5
(41)
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.
(Multiple Choice)
4.8/5
(36)
A mechanism in a ResultSet object in Java that points to the current row of data is called a:
(Multiple Choice)
4.9/5
(34)
An API is a set of routines that a database server uses to access database objects.
(True/False)
4.9/5
(40)
When developing an application, one must decide where it will be placed when it is developed.
(True/False)
4.9/5
(37)
All of the following are additional methods of Web security EXCEPT:
(Multiple Choice)
4.9/5
(37)
ABET is a common encryption method used to secure data traveling between a client and a server.
(True/False)
4.9/5
(39)
Showing 41 - 60 of 93
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)