Exam 9: Data Design

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If a primary key combines two or more fields, then it is called a _____.

(Multiple Choice)
4.9/5
(39)

_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.

(Multiple Choice)
4.8/5
(35)

A _____ controls database operations, including storing, retrieving, updating, and deleting data.

(Multiple Choice)
4.7/5
(33)

Matching ​Identify the letters of the choices that best match the phrases or definitions. -A set of rules that avoids data inconsistency and quality problems

(Multiple Choice)
4.9/5
(37)

A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.

(Multiple Choice)
4.9/5
(31)

A _____, which is not unique, is a field or combination of fields that can be used to access or retrieve records.

(Multiple Choice)
4.9/5
(32)

Any field that is not a primary key or a candidate key is called a _____.

(Multiple Choice)
4.9/5
(32)

_____ is strictly hardware-related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.

(Multiple Choice)
4.9/5
(40)

List and discuss at least 5 specific database management system (DBMS) advantages.

(Essay)
4.8/5
(41)

Each _____ contains data about people, places, things, or events.

(Multiple Choice)
4.9/5
(35)

In the event of a file catastrophe, _____ can be used to restore the file or database to its current state at the time of the last backup.

(Multiple Choice)
4.8/5
(43)

Which of the following are the advantages of a DBMS (database management system)?

(Multiple Choice)
4.8/5
(31)

Designing tables is easier if a _____ is used to show a table's structure, fields, and primary key.

(Multiple Choice)
4.9/5
(35)

_____ are numbers or letters assigned in a specific order.

(Multiple Choice)
4.7/5
(32)

_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers.

(Multiple Choice)
4.9/5
(32)

The inherent efficiency of high-volume processing on larger computers is called _____.

(Multiple Choice)
4.9/5
(35)

Anna asks if it is manageable to fetch records using a field or combination of fields that is not unique. Emily tells her that it is possible using one type of key. Identify the type of key used here.

(Multiple Choice)
4.8/5
(44)

A _____ is designed to serve the needs of a specific department, such as sales, marketing, or finance.

(Multiple Choice)
4.8/5
(35)

Matching ​Identify the letters of the choices that best match the phrases or definitions. -A kind of storage that refers to data that a user can view, regardless of how or where the information actually is organized or stored

(Multiple Choice)
4.9/5
(39)

_____, a coding method that uses one byte per character, is used on most personal computers.

(Multiple Choice)
4.8/5
(37)
Showing 41 - 60 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)