Exam 14: Ecommerce, Databases, and Data Science
Exam 1: An Introduction to Computer Science50 Questions
Exam 2: Algorithm Discovery and Design50 Questions
Exam 3: The Efficiency of Algorithms50 Questions
Exam 4: The Building Blocks: Binary Numbers, Boolean Logic, and Gates50 Questions
Exam 5: Computer Systems Organization50 Questions
Exam 6: An Introduction to System Software and Virtual Machines50 Questions
Exam 7: Computer Networks and Cloud Computing50 Questions
Exam 8: Information Security50 Questions
Exam 9: Introduction to High-Level Language Programming50 Questions
Exam 10: The Tower of Babel: Programming Languages50 Questions
Exam 11: Compilers and Language Translation50 Questions
Exam 12: Models of Computation50 Questions
Exam 13: Simulation and Modeling50 Questions
Exam 14: Ecommerce, Databases, and Data Science50 Questions
Exam 15: Artificial Intelligence50 Questions
Exam 16: Computer Graphics and Entertainment: Movies, Games, and Virtual Communities50 Questions
Exam 17: Making Decisions About Computers, Information, and Society50 Questions
Select questions type
In the ____ world, customers have quick, easy, and secure access to purchasing items and paying for services through the World Wide Web.
(Multiple Choice)
4.9/5
(36)
The term __________ expresses that we now have huge amounts of data available.
(Multiple Choice)
4.9/5
(30)
A(n)____________________ is a graphical ad, often with animation, placed in a prominent position on a webpage.
(Short Answer)
4.9/5
(42)
A meta tag is a small text file that the web server sends to the user's browser and that gets stored on the user's hard drive. _________________________
(True/False)
4.8/5
(38)
A ____ is one where multiple keys are needed to identify a tuple uniquely.
(Multiple Choice)
4.8/5
(46)
Building massive, integrated government databases raises fewer technical questions than legal, political, social, and ethical ones.
(True/False)
4.9/5
(46)
Describe in detail how your potential customers learn your URL in the first place
(Essay)
4.8/5
(37)
Encryption is the method in which data are protected during a transaction._________________________
(True/False)
4.8/5
(33)
The SQL command to create a table only requires specification of the various attributes by name and data type.
(True/False)
4.8/5
(37)
Each category of information in a database is called a(n)____.
(Multiple Choice)
4.8/5
(34)
To manage a relational table, you need only be able to add new tuples to the table and delete tuples from a table.
(True/False)
4.8/5
(26)
Using multiple ____________________ in a single database minimizes the amount of work required to maintain consistency in the data.
(Short Answer)
4.9/5
(38)
Authentication is the process of verifying the identity of the receiver of the data._________________________
(True/False)
4.8/5
(32)
A disk input/output (I/O)operation is a much slower process than accessing information stored in main memory, sometimes by as much as three or four orders of magnitude._________________________
(True/False)
4.8/5
(42)
An ____ will, for a fee, design your website and manage it on an ongoing basis.
(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)