Exam 9: Data Design
Exam 1: Introduction to Systems Analysis and Design80 Questions
Exam 2: Analyzing the Business Case81 Questions
Exam 3: Managing Systems Projects78 Questions
Exam 4: Requirements Modeling98 Questions
Exam 5: Data and Process Modeling84 Questions
Exam 6: Object Modeling78 Questions
Exam 7: Development Strategies82 Questions
Exam 8: User Interface Design82 Questions
Exam 9: Data Design86 Questions
Exam 10: System Architecture78 Questions
Exam 11: Managing Systems Implementation81 Questions
Exam 12: Managing Systems Support and Security81 Questions
Exam 13: Toolkit A: The Systems Analysts Toolkit45 Questions
Exam 14: Toolkit B: Case Tools44 Questions
Exam 15: Toolkit C: Financial Analysis Tools45 Questions
Exam 16: Toolkit D: Internet Resource Tools44 Questions
Select questions type
If a primary key combines two or more fields, then it is called a _____.
(Multiple Choice)
4.9/5
(39)
_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.
(Multiple Choice)
4.8/5
(35)
A _____ controls database operations, including storing, retrieving, updating, and deleting data.
(Multiple Choice)
4.7/5
(33)
Matching
Identify the letters of the choices that best match the phrases or definitions.
-A set of rules that avoids data inconsistency and quality problems
(Multiple Choice)
4.9/5
(37)
A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.
(Multiple Choice)
4.9/5
(31)
A _____, which is not unique, is a field or combination of fields that can be used to access or retrieve records.
(Multiple Choice)
4.9/5
(32)
Any field that is not a primary key or a candidate key is called a _____.
(Multiple Choice)
4.9/5
(32)
_____ is strictly hardware-related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.
(Multiple Choice)
4.9/5
(40)
List and discuss at least 5 specific database management system (DBMS) advantages.
(Essay)
4.8/5
(41)
Each _____ contains data about people, places, things, or events.
(Multiple Choice)
4.9/5
(35)
In the event of a file catastrophe, _____ can be used to restore the file or database to its current state at the time of the last backup.
(Multiple Choice)
4.8/5
(43)
Which of the following are the advantages of a DBMS (database management system)?
(Multiple Choice)
4.8/5
(31)
Designing tables is easier if a _____ is used to show a table's structure, fields, and primary key.
(Multiple Choice)
4.9/5
(35)
_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers.
(Multiple Choice)
4.9/5
(32)
The inherent efficiency of high-volume processing on larger computers is called _____.
(Multiple Choice)
4.9/5
(35)
Anna asks if it is manageable to fetch records using a field or combination of fields that is not unique. Emily tells her that it is possible using one type of key. Identify the type of key used here.
(Multiple Choice)
4.8/5
(44)
A _____ is designed to serve the needs of a specific department, such as sales, marketing, or finance.
(Multiple Choice)
4.8/5
(35)
Matching
Identify the letters of the choices that best match the phrases or definitions.
-A kind of storage that refers to data that a user can view, regardless of how or where the information actually is organized or stored
(Multiple Choice)
4.9/5
(39)
_____, a coding method that uses one byte per character, is used on most personal computers.
(Multiple Choice)
4.8/5
(37)
Showing 41 - 60 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)