Exam 12: Databases, Controls, and Security
Exam 1: From Beginning to End: An Overview of Systems Analysis and Design70 Questions
Exam 2: Investigating System Requirements90 Questions
Exam 3: Use Cases72 Questions
Exam 4: Domain Modeling69 Questions
Exam 5: Extending the Requirements Models73 Questions
Exam 6: Essentials of Design and the Design Activities75 Questions
Exam 7: Designing the User and System Interfaces73 Questions
Exam 8: Approaches to System Development71 Questions
Exam 9: Project Planning and Project Management75 Questions
Exam 10: Object-Oriented Design Principles72 Questions
Exam 11: Use Case Realizations70 Questions
Exam 12: Databases, Controls, and Security80 Questions
Exam 13: Making the System Operational70 Questions
Exam 14: Current Trends in System Development70 Questions
Select questions type
____ is a one-to-one correspondence between two field values.
(Multiple Choice)
4.8/5
(40)
A foreign key is a field or set of fields stored in one table that also exists as a primary key in another table.
(True/False)
4.7/5
(36)
What is the name of a general control technique used to ensure that entered data is correct?
(Multiple Choice)
4.8/5
(35)
List and briefly describe the four components of a database management system.
(Essay)
4.9/5
(42)
_______ is the process of allowing or restricting a specific user's access to specific resources.
(Short Answer)
4.8/5
(37)
All ____ in a table are guaranteed to be unique if the table's primary key is guaranteed to be unique.
(Multiple Choice)
4.9/5
(39)
What is a control that checks the value of a field to ensure that it is within the correct range?
(Multiple Choice)
4.7/5
(37)
One column of a table in a relational database is called a(n)____.
(Multiple Choice)
4.9/5
(40)
A(n)____________________ describes the structure,content,and access controls of a physical data store or database.
(Short Answer)
4.9/5
(37)
A user who has special security and access to a system,such as the right to assign passwords,is called a ____.
(Multiple Choice)
4.9/5
(36)
A security measure that automatically deletes sensitive data from a portable device when an unauthorized access is attempted is a called a(n)_______.
(Short Answer)
4.9/5
(27)
A(n)____ is a field or set of fields used to uniquely identify each row.
(Multiple Choice)
4.7/5
(32)
Which of the following can be classified as privileged users?
(Multiple Choice)
4.9/5
(39)
_______ database server architecture is poorly suited to applications that must be available on a seven-day,24-hour basis.
(Short Answer)
4.8/5
(42)
____ is a consistent relational database state in which every foreign key value also exists as a primary key value.
(Multiple Choice)
4.8/5
(38)
Completeness control is an integrity control that identifies when a value in a field is too large or too small.
(True/False)
4.9/5
(39)
What is the name of the control mechanism that is used to ensure that all necessary information for a transaction has been entered?
(Multiple Choice)
4.7/5
(39)
A data type that is supported directly by computer hardware or a programming language is called a(n)_______ data type.
(Short Answer)
4.7/5
(31)
Each class on an class diagram is represented by a(n)____ in a relational database.
(Multiple Choice)
4.7/5
(35)
What danger(s)is/are inherent in using keys invented by external agents as primary keys in a relational database?
(Essay)
4.9/5
(42)
Showing 61 - 80 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)