Exam 9: Data Design

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Matching ​Identify the letters of the choices that best match the phrases or definitions. -A coding method used on mainframe computers and high-capacity servers

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

G

A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

False

In a web-based design, the Internet serves as the _____ for the database management system.

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

A, D

Migrating a traditional database design to the web can require design modification, additional software, and some added expense.

(True/False)
4.9/5
(29)

Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.

(True/False)
4.8/5
(32)

Matching ​Identify the letters of the choices that best match the phrases or definitions. -A widely used method of visualizing and documenting software systems design

(Multiple Choice)
4.9/5
(33)

At the beginning of the twenty-first century, many firms that used only two digits to represent the year were faced with a major problem called the _____.

(Multiple Choice)
4.9/5
(42)

One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems.

(Multiple Choice)
4.8/5
(38)

Most date formats now are based on the model established by the International Organization for Standardization (ISO), which requires a format of _____.

(Multiple Choice)
4.9/5
(35)

EBCDIC and ASCII both require _____ bits for storage of each character.

(Multiple Choice)
4.9/5
(38)

A common method of cardinality notation is called _____ because of the shapes, which include circles, bars, and symbols that indicate various possibilities.

(Multiple Choice)
4.7/5
(24)

A table is in _____ if it is in first normal form and if all fields that are not part of the primary key are functionally dependent on the entire primary key.

(Multiple Choice)
4.8/5
(44)

_____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.

(Multiple Choice)
4.7/5
(29)

Audit log files, which record details of all accesses and changes to a file or database, can be used to recover changes made since the last backup.

(True/False)
4.8/5
(34)

Emily tells Anna that a primary key is a field or combination of fields that individually and minimally recognizes a specific entity. She mentions that there may be an option of fields or field combinations to use as the primary key. Which of the following is the term used for a feasible primary key?

(Multiple Choice)
4.8/5
(38)

To bridge the gap between a database and the Internet, it is necessary to use a _____, which is software that integrates different applications and allows them to exchange data.

(Multiple Choice)
4.9/5
(21)

In a table or file, each column represents a record and each row represents a field.

(True/False)
4.8/5
(37)

Matching ​Identify the letters of the choices that best match the phrases or definitions. -A set of field values that describes a single person, place, thing, or event

(Multiple Choice)
4.7/5
(29)

A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form.

(Multiple Choice)
4.9/5
(37)

In an entity-relationship diagram, entities are commonly represented as _____.

(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)