Exam 14: Ecommerce, Databases, and Data Science

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is required by the SQL command to create a table?

(Essay)
4.8/5
(33)

In the ____ world, customers have quick, easy, and secure access to purchasing items and paying for services through the World Wide Web.

(Multiple Choice)
4.9/5
(36)

The term __________ expresses that we now have huge amounts of data available.

(Multiple Choice)
4.9/5
(30)

A(n)____________________ is a graphical ad, often with animation, placed in a prominent position on a webpage.

(Short Answer)
4.9/5
(42)

A meta tag is a small text file that the web server sends to the user's browser and that gets stored on the user's hard drive. _________________________

(True/False)
4.8/5
(38)

A ____ is one where multiple keys are needed to identify a tuple uniquely.

(Multiple Choice)
4.8/5
(46)

The Internet has been around since 1969.

(True/False)
4.8/5
(33)

Building massive, integrated government databases raises fewer technical questions than legal, political, social, and ethical ones.

(True/False)
4.9/5
(46)

What, in detail, is cybersquatting?

(Essay)
5.0/5
(28)

Describe in detail how your potential customers learn your URL in the first place

(Essay)
4.8/5
(37)

Encryption is the method in which data are protected during a transaction._________________________

(True/False)
4.8/5
(33)

The SQL command to create a table only requires specification of the various attributes by name and data type.

(True/False)
4.8/5
(37)

Each category of information in a database is called a(n)____.

(Multiple Choice)
4.8/5
(34)

To manage a relational table, you need only be able to add new tuples to the table and delete tuples from a table.

(True/False)
4.8/5
(26)

Explain what distributed databases allow.

(Essay)
4.9/5
(47)

Using multiple ____________________ in a single database minimizes the amount of work required to maintain consistency in the data.

(Short Answer)
4.9/5
(38)

Authentication is the process of verifying the identity of the receiver of the data._________________________

(True/False)
4.8/5
(32)

A disk input/output (I/O)operation is a much slower process than accessing information stored in main memory, sometimes by as much as three or four orders of magnitude._________________________

(True/False)
4.8/5
(42)

An ____ will, for a fee, design your website and manage it on an ongoing basis.

(Multiple Choice)
4.9/5
(35)

____ is an online coupon site.

(Multiple Choice)
4.7/5
(33)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)