Exam 3: The Relational Model: SQL
Exam 1: Introduction to Database Management50 Questions
Exam 2: The Relational Model: Introduction, Qbe, and Relational Algebra50 Questions
Exam 3: The Relational Model: SQL50 Questions
Exam 4: The Relational Model: Advanced Topics50 Questions
Exam 5: Database Design: Normalization50 Questions
Exam 6: Database Design: Relationships50 Questions
Exam 7: Database Management Systems Processes and Services50 Questions
Exam 8: Database Industry Careers50 Questions
Exam 9: Database Industry Trends50 Questions
Select questions type
In Microsoft Access, what do you need to decrypt an encrypted database?
(Multiple Choice)
4.8/5
(32)
Some enterprise-level systems refer to the catalog as the _____.
(Multiple Choice)
4.8/5
(33)
Compare techniques for handling concurrent updates in Access and those in larger database management systems on the web.
(Essay)
4.9/5
(36)
_____ means that a copy of a database is distributed to other computers or locations.
(Multiple Choice)
4.8/5
(35)
In a database catalog, _____ includes information about table relationships, views, indexes, and properties.
(Multiple Choice)
4.8/5
(34)
Which type of data integrity constraint states that the value entered for any field should be consistent with the data type for that field?
(Multiple Choice)
4.9/5
(45)
Database security can be defined as prevention of changes to the structure of a database.
(True/False)
4.8/5
(26)
Describe the legal values constraint and how to apply it to best serve database users, including an example to support your answer.
(Essay)
4.7/5
(33)
What type of rules specify user privileges to select, insert, update, and delete data for different tables and views?
(Multiple Choice)
4.9/5
(45)
Which concept of a DBMS means that you change the database structure without requiring you to change the programs that access the database?
(Multiple Choice)
5.0/5
(34)
Which Microsoft Access feature do you use to set legal value constraints?
(Multiple Choice)
4.8/5
(34)
Which of the following does a DBMS log typically not include for each transaction?
(Multiple Choice)
4.8/5
(35)
If you want to constrain a Bonus field to the values 250, 500, and 750, what type of constraint should you apply?
(Multiple Choice)
4.8/5
(38)
Which of the following is not a common security feature used by database management systems?
(Multiple Choice)
4.8/5
(36)
What technique is used to identify the person who is attempting to access the DBMS?
(Multiple Choice)
4.8/5
(32)
Which of the following is information that the Access Database Documenter does not provide?
(Multiple Choice)
4.9/5
(28)
Which of the following is an authentication tool in which information used to identify a user is stored on a physical card?
(Multiple Choice)
4.8/5
(22)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)