Exam 3: The Relational Model: SQL

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In Microsoft Access, what do you need to decrypt an encrypted database?

(Multiple Choice)
4.8/5
(32)

Some enterprise-level systems refer to the catalog as the _____.

(Multiple Choice)
4.8/5
(33)

Compare techniques for handling concurrent updates in Access and those in larger database management systems on the web.

(Essay)
4.9/5
(36)

_____ means that a copy of a database is distributed to other computers or locations.

(Multiple Choice)
4.8/5
(35)

In a database catalog, _____ includes information about table relationships, views, indexes, and properties.

(Multiple Choice)
4.8/5
(34)

Which type of data integrity constraint states that the value entered for any field should be consistent with the data type for that field?

(Multiple Choice)
4.9/5
(45)

How does Access handle concurrent updates?

(Multiple Choice)
4.9/5
(41)

Database security can be defined as prevention of changes to the structure of a database.

(True/False)
4.8/5
(26)

Describe the legal values constraint and how to apply it to best serve database users, including an example to support your answer.

(Essay)
4.7/5
(33)

What type of rules specify user privileges to select, insert, update, and delete data for different tables and views?

(Multiple Choice)
4.9/5
(45)

Which concept of a DBMS means that you change the database structure without requiring you to change the programs that access the database?

(Multiple Choice)
5.0/5
(34)

Which Microsoft Access feature do you use to set legal value constraints?

(Multiple Choice)
4.8/5
(34)

What do key integrity constraints consist of?

(Multiple Choice)
4.8/5
(34)

Which of the following does a DBMS log typically not include for each transaction?

(Multiple Choice)
4.8/5
(35)

If you want to constrain a Bonus field to the values 250, 500, and 750, what type of constraint should you apply?

(Multiple Choice)
4.8/5
(38)

Which of the following is a database-as-a-service product?

(Multiple Choice)
4.9/5
(40)

Which of the following is not a common security feature used by database management systems?

(Multiple Choice)
4.8/5
(36)

What technique is used to identify the person who is attempting to access the DBMS?

(Multiple Choice)
4.8/5
(32)

Which of the following is information that the Access Database Documenter does not provide?

(Multiple Choice)
4.9/5
(28)

Which of the following is an authentication tool in which information used to identify a user is stored on a physical card?

(Multiple Choice)
4.8/5
(22)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)