Exam 11: Databases

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the repercussions when a database security breach occurs in a legitimate organization?

(Essay)
4.9/5
(29)

A(n) ____ file uses a uniform format to store data for each person or thing in the file.

(Multiple Choice)
4.9/5
(35)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Much like an accordion, the field expands to fit the data being entered
Responses:
data view
variable-length field
field
Correct Answer:
Verified
Premises:
Responses:
Much like an accordion, the field expands to fit the data being entered
data view
(Matching)
4.9/5
(31)

The United States has some of the strongest privacy regulations in the developed world.

(True/False)
4.8/5
(42)

In SQL, the CHANGE command changes data in a field.

(True/False)
4.8/5
(35)

Database ____ software allows any remote computer or network workstation to access data in a database.

(Multiple Choice)
5.0/5
(33)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Specifies the way data is represented on the disk and in RAM
Responses:
data type
variable-length field
object-relational database
Correct Answer:
Verified
Premises:
Responses:
Specifies the way data is represented on the disk and in RAM
data type
(Matching)
4.8/5
(37)

Which of the following has the most limited versatility?

(Multiple Choice)
4.7/5
(38)

Which of the following is NOT true of XML?

(Multiple Choice)
4.8/5
(46)

Some relational database management systems (RDBMSs) allow the database server to receive queries in the form of XML commands.

(True/False)
4.8/5
(37)

The hyperlink data type stores data that can have one of two values.

(True/False)
5.0/5
(36)

ChoicePoint was duped into distributing personal information for more than ____ people.

(Multiple Choice)
4.9/5
(21)

A(n) ____________________ database stores data in a collection of related tables.

(Short Answer)
4.8/5
(31)

A report ____ contains the outline or general specifications for a report, including such elements as the report title, fields to include, fields to subtotal/total, and report format specifications.

(Multiple Choice)
4.8/5
(37)

Explain five things you can do to protect yourself from vulnerability to database security breaches.

(Essay)
4.8/5
(27)

Differentiate between a variable-length field and a fixed-length field.

(Essay)
4.9/5
(34)

A(n) ____________________ is a procedure that monitors and records user activity within a database.

(Short Answer)
4.9/5
(36)

Critical Thinking questions (Multiple Choice) If a single data management tool can be used to maintain many different files and databases, it must support data ____.

(Multiple Choice)
4.7/5
(33)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Can block unauthorized users
Responses:
record
variable-length field
computed
Correct Answer:
Verified
Premises:
Responses:
Can block unauthorized users
record
(Matching)
4.9/5
(36)

Case 3 There is the database designer and the people who enter the data. Sometimes this is the same person, but in Kate's large banking firm, the actual database entries are not made by the people who designed the database. A data entry operator might enter a telephone number as 555-555-7777, (555) 555-7777, or 1-555-555-7777. If multiple data entry operators enter telephone numbers in different reports, it becomes difficult to produce nicely formatted reports or locate a particular telephone number. To make sure that a field contains all unique values, Kate can set up the database using a ____ so that the database will search every existing record to make sure the new value does not duplicate an existing value in that field.

(Multiple Choice)
4.7/5
(46)
Showing 21 - 40 of 175
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)