Exam 11: Databases

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Explain five things you can do to minimize your personal data's vulnerability to database security breaches.

(Essay)
4.9/5
(35)

The following SQL operator can be used to omit records from a search by specifying a not-equal relationship: ____.

(Multiple Choice)
4.8/5
(38)

Each column of a relational database table is equivalent to a(n)____________________.

(Short Answer)
4.8/5
(37)

WebMusic’s database designer, Janet, has hired an intern. She has requested that this intern create some SQL queries that would be useful to managers tracking the day-to-day operations of the store. -Janet wants her intern to make some changes to the contents of records in the store's database.Which of the following commands would the intern use?

(Multiple Choice)
4.8/5
(40)

Database tables should be indexed by any field or fields that are commonly used as search fields.

(True/False)
4.8/5
(39)

All of the following are tools to help you create server-side programs EXCEPT ____.

(Multiple Choice)
4.8/5
(33)

A ____ contains the outline or general specifications for a report,including such elements as the report title,fields to include,fields to subtotal/total,and report format specifications.

(Multiple Choice)
4.9/5
(41)

In an object database,an attribute is ____.

(Multiple Choice)
4.8/5
(30)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -Type of rule used to filter the data entered into a particular field

(Multiple Choice)
4.7/5
(41)

A field ____________________ helps maintain consistent data by providing a structure for entering data into a field.

(Short Answer)
4.9/5
(34)

A(n)____ limits access to systems,such as computer databases.

(Multiple Choice)
4.8/5
(35)

One of the most common database operations is to query for a particular record or group of records using the ____ command.

(Multiple Choice)
4.8/5
(34)

The index key for a table specifies the order in which records are stored and where new records are inserted in a table._________________________

(True/False)
4.8/5
(34)

The inclusive and exclusive ____ SQL operators designate records that meet either one of a set of two criteria or both.

(Multiple Choice)
4.7/5
(40)

A(n) indexsimply points to the record where the data can be found._________________________

(True/False)
4.8/5
(32)

The term database ____________________ refers to the arrangement of the fields,tables,and relationships in a database.

(Short Answer)
4.9/5
(37)

In some business environments, the database designer also enters the data into the database. In Kate’s large banking firm, however, the actual database entries are not made by the database designers. After perusing the database, Kate has discovered that one data entry operator might enter a telephone number as 555-555-7777, another as (555) 555-7777, and a third as 1-555-555-7777. When multiple data entry operators enter telephone numbers in different formats, it becomes difficult to produce nicely formatted reports or to locate a particular telephone number. -To make sure that a field contains all unique values,Kate wants to set up the database so that it will search every existing record for duplicates.What will accomplish this goal for Kate?

(Multiple Choice)
5.0/5
(35)

Database ____ provides users with an easy-to-use interface for entering search specifications,new records,data updates,and so on.

(Multiple Choice)
4.9/5
(34)

____ can block unauthorized users and limit activities of authorized users.

(Multiple Choice)
4.7/5
(37)

A ____ data type usually provides a variable-length field into which users can enter comments.

(Multiple Choice)
4.9/5
(39)
Showing 21 - 40 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)