Exam 14: Databases and Database Management Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ is a growing concern because of the vast amounts of personal data stored in databases today and the many breaches that have occurred in the recent past.

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

A

In a typical client-server database application, the client is called the ____.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

D

  -The accompanying figure shows an n-tier database model. -The accompanying figure shows an n-tier database model.

Free
(True/False)
4.9/5
(39)
Correct Answer:
Verified

True

Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as building user interfaces, creating forms and reports, and interfacing with query languages and ____ for complex applications.

(Multiple Choice)
4.8/5
(20)

The ____ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.

(Multiple Choice)
4.9/5
(36)

In ____________________ organization, the order of the records is physically based on the content of the key field.

(Short Answer)
4.9/5
(32)

Virtually all DBMSs include a ____ for easy data input, modification, and retrieval.

(Multiple Choice)
4.9/5
(33)

A field is also called a ____.

(Multiple Choice)
4.9/5
(32)

To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to create a query object.

(Multiple Choice)
4.8/5
(36)

____ create the actual database, based on the design generated by the database designer, and get it ready for data entry.

(Multiple Choice)
4.8/5
(36)

In ASPs, the code to tie the database to the Web site is typically written in JavaScript or ____.

(Multiple Choice)
4.7/5
(39)

A ____ is a collection of related fields.

(Multiple Choice)
4.8/5
(29)

One of the properties that can be assigned to a field is a(n) ____ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.

(Multiple Choice)
4.9/5
(29)

____________________ databases are located on a PC and are designed to be accessed by one user.

(Short Answer)
4.9/5
(34)

Views need to be designed to extract the needed information in as efficient a manner as possible.

(True/False)
4.9/5
(33)

In ____, the table field involved in the changes is locked until the changes to that field have been completed.

(Multiple Choice)
4.8/5
(31)

With a(n) ____________________, the data is separated into several databases, each of which is stored on a different computer that may be in different physical locations from one another but that are connected via a network.

(Essay)
4.8/5
(42)

The characteristics of an entity are called ____.

(Multiple Choice)
4.8/5
(38)

Middleware for Web database applications is commonly written as ____-short sections of code written in a programming or scripting language that are executed by another program.

(Multiple Choice)
4.9/5
(37)

To protect against data loss caused by a database failure, accidental deletion, or other problem that renders the main copy of a database unusable, stringent backup procedures should be implemented.

(True/False)
4.8/5
(35)
Showing 1 - 20 of 72
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)