Exam 14: Databases and Database Management Systems
Exam 1: Introduction to the World of Computers100 Questions
Exam 2: The System Unit: Processing and Memory100 Questions
Exam 3: Storage100 Questions
Exam 4: Input and Output100 Questions
Exam 5: System Software: Operating Systems and Utility Programs100 Questions
Exam 6: Application Software100 Questions
Exam 7: Computer Networks100 Questions
Exam 8: The Internet and the World Wide Web100 Questions
Exam 9: Network and Internet Security100 Questions
Exam 10: Multimedia and the Web100 Questions
Exam 11: E-Commerce100 Questions
Exam 12: Information Systems and System Development100 Questions
Exam 13: Program Development and Programming Languages100 Questions
Exam 14: Databases and Database Management Systems100 Questions
Exam 15: Computer Security and Privacy100 Questions
Exam 16: Intellectual Property Rights, Ethics, Health, Access, and the Environment100 Questions
Select questions type
____ actually create the database,based on the design generated by the database designer,and get it ready for data entry.
(Multiple Choice)
4.9/5
(35)
Views need to be designed to extract the needed information in as efficient a manner as possible.
(True/False)
4.9/5
(27)
To ensure the uniqueness of the ____________________,it usually consists of an identifying number,such as a student ID number,customer number,or product number.
(Short Answer)
4.7/5
(42)
IBM's DB2 9 program contains a hybrid XML/relational database server.
(True/False)
4.8/5
(34)
In ASPs,the code to tie the database to the Web site is typically written in JavaScript or ____.
(Multiple Choice)
4.8/5
(34)
A ____ extracts specific information from a database by specifying particular conditions (called criteria)about the data you would like to retrieve.
(Multiple Choice)
4.8/5
(41)
One emerging data security risk is the exploitation of known but unpatched vulnerabilities by hackers.
(True/False)
4.8/5
(26)
____________________ refers to the process of ensuring that the data entered into a database matches the specified type,format,and allowable value.
(Short Answer)
4.9/5
(36)
Software that connects two otherwise separate applications-such as a Web server and a DBMS-is referred to as interware
(True/False)
4.9/5
(29)
A ____ holds a single category of data (such as customer names or employee telephone numbers)that will be stored in a database.
(Multiple Choice)
4.8/5
(52)
With a(n)____________________,the data is divided among several computers connected via a network.
(Essay)
4.8/5
(30)
Multidimensional databases are appropriate when a variety of types of objects need to be stored and retrieved.
(True/False)
4.9/5
(44)
____ databases are designed to store a collection of summarized data for quick and easy data analysis.
(Multiple Choice)
4.7/5
(45)
The key characteristics for an OODBMS (including objects,attributes,methods,____,and inheritance)are similar to object-oriented programming principles.
(Multiple Choice)
4.7/5
(43)
The first step in designing a relational database is to identify the ____________________ of the database.
(Short Answer)
4.9/5
(34)
Data accessibility refers to protecting data against destruction and misuse-both intentionally and accidentally.
(True/False)
4.8/5
(33)
In ____,the table field involved in the changes is locked until the changes to that field have been completed.
(Multiple Choice)
4.9/5
(38)
Showing 61 - 80 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)