Filters
Question type

Study Flashcards

A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.


A) entity-relationship diagram (ERD)
B) illustration flow chart
C) query relationship diagram (QRD)
D) data chart

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Common fields can be used to link entities in various types of relationships.

A) True
B) False

Correct Answer

verifed

verified

Binary digits have only _____ possible value(s) .


A) one
B) two
C) three
D) four

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Audit log files,which record details of all accesses and changes to a file or database,can be used to recover changes made since the last backup.

A) True
B) False

Correct Answer

verifed

verified

Web-based designs are dependent on a specific combination of hardware and software.

A) True
B) False

Correct Answer

verifed

verified

Mainframe storage refers to data that a user can view,understand,and access,regardless of how or where that information actually is organized or stored.

A) True
B) False

Correct Answer

verifed

verified

The data mining technique that relies on association rule learning is often called _____.


A) simulated analysis
B) virtual storage analysis
C) strategy-oriented analysis
D) market basket analysis

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Web-based systems are popular because they offer ease of access,cost-effectiveness,and worldwide connectivity.

A) True
B) False

Correct Answer

verifed

verified

One type of validity check,called _____,is a set of rules that avoids data inconsistency and quality problems.


A) candidate integrity
B) foreign integrity
C) referential integrity
D) combinatorial integrity

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

The complete definition of a database,including descriptions of all fields,tables,and relationships,is called a _____.


A) viewport
B) schema
C) framework
D) cell

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

_____ use a keyword to encode a number.


A) Cipher codes
B) Identifier codes
C) Action codes
D) Associative codes

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

An M:N relationship is different from 1:1 or 1:M relationships because the event or transaction that links the two entities is actually a third entity,called an associative entity,that has its own characteristics.

A) True
B) False

Correct Answer

verifed

verified

Case 9-1 Eamon is planning to start an online store that specializes in books and electronics. Since it’s his first business, he has a lot of doubts. Help Eamon set up his business by answering the following questions. -Eamon plans to operate three warehouses,in different cities,to support his business.To find the exact location of a product,he wants to establish a code that identifies a product's warehouse location,floor number,section number,aisle number,and bin number.By doing this,he can ship the ordered products faster.Which of the following codes would you suggest that Eamon use?


A) Significant digit code
B) Block sequence code
C) Sequence code
D) Action code

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

_____ combine data from different item attributes,or characteristics,to build a code.


A) Sequence codes
B) Category codes
C) Significant digit codes
D) Derivation codes

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

A table design is in third normal form (3NF)if it is in 2NF and if all nonkey fields are dependent on one another.

A) True
B) False

Correct Answer

verifed

verified

_____ enables Java applications to exchange data with any database that uses SQL statements and is compliant with its standard.


A) Java runtime environment (JRE)
B) Java eclipse framework connectivity (JEFC)
C) Java virtual machine (JVM)
D) Java database connectivity (JDBC)

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A _____ specifies the fields and identifies the primary key in a particular file.


A) frame design
B) table design
C) viewport
D) window

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Case 9-1 Eamon is planning to start an online store that specializes in books and electronics. Since it’s his first business, he has a lot of doubts. Help Eamon set up his business by answering the following questions. -Eamon wants to provide a discount to premium buyers who order in large quantities.He wants to create a code for each price and share it with them.Also,he wants to ensure that only the premium buyers can decipher the code shared.In this scenario,which of the following codes would you suggest that Eamon use?


A) Cipher code
B) Mnemonic code
C) Action code
D) Derivation code

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

A _____ controls database operations,including storing,retrieving,updating,and deleting data.


A) data manipulation language
B) data device language
C) data definition language
D) data query language

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.


A) Encapsulation
B) Normalization
C) Standardization
D) Encryption

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Showing 21 - 40 of 74

Related Exams

Show Answer