Filters
Question type

Study Flashcards

Matching ​Identify the letters of the choices that best match the phrases or definitions. -A widely used method of visualizing and documenting software systems design


A) Unified Modeling Language (UML)
B) Cardinality
C) Foreign key
D) Data mining
E) Referential integrity
F) Subschema
G) Extended Binary Coded Decimal Interchange Code (EBCDIC)
H) Entity
I) Logical record
J) Logical storage

K) B) and C)
L) A) and C)

Correct Answer

verifed

verified

EBCDIC and ASCII both require _____ bits for storage of each character.


A) six
B) eight
C) twelve
D) sixteen

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Migrating a traditional database design to the web can require design modification, additional software, and some added expense.

A) True
B) False

Correct Answer

verifed

verified

One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems.


A) candidate integrity
B) foreign integrity
C) referential integrity
D) combinatorial integrity

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

At the beginning of the twenty-first century, many firms that used only two digits to represent the year were faced with a major problem called the _____.


A) Y2K issue
B) H2R issue
C) 2D issue
D) ​2DGT issue

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

_____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.


A) ActiveX data object (ADO)
B) Java virtual connector (JVC)
C) Open database connectivity (ODBC)
D) Open embedded connectivity (OEC)

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.

A) True
B) False

Correct Answer

verifed

verified

False

A table is in _____ if it is in first normal form and if all fields that are not part of the primary key are functionally dependent on the entire primary key.


A) second normal form
B) zeroth normal form
C) third normal form
D) fourth normal form

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form.


A) 12
B) 24
C) 30
D) 32

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Matching ​Identify the letters of the choices that best match the phrases or definitions. -A coding method used on mainframe computers and high-capacity servers


A) Unified Modeling Language (UML)
B) Cardinality
C) Foreign key
D) Data mining
E) Referential integrity
F) Subschema
G) Extended Binary Coded Decimal Interchange Code (EBCDIC)
H) Entity
I) Logical record
J) Logical storage

K) H) and I)
L) C) and E)

Correct Answer

verifed

verified

G

Emily tells Anna that a primary key is a field or combination of fields that individually and minimally recognizes a specific entity. She mentions that there may be an option of fields or field combinations to use as the primary key. Which of the following is the term used for a feasible primary key?


A) Candidate key
B) Ancillary key
C) Foreign key
D) Multifaceted key

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

In an entity-relationship diagram, entities are commonly represented as _____.


A) triangles
B) circles
C) rectangles
D) hexagons

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Matching ​Identify the letters of the choices that best match the phrases or definitions. -A set of field values that describes a single person, place, thing, or event


A) Unified Modeling Language (UML)
B) Cardinality
C) Foreign key
D) Data mining
E) Referential integrity
F) Subschema
G) Extended Binary Coded Decimal Interchange Code (EBCDIC)
H) Entity
I) Logical record
J) Logical storage

K) B) and I)
L) A) and E)

Correct Answer

verifed

verified

Audit log files, which record details of all accesses and changes to a file or database, can be used to recover changes made since the last backup.

A) True
B) False

Correct Answer

verifed

verified

In a web-based design, the Internet serves as the _____ for the database management system.


A) front end
B) back end
C) middleware
D) interface

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

A, D

Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.

A) True
B) False

Correct Answer

verifed

verified

A common method of cardinality notation is called _____ because of the shapes, which include circles, bars, and symbols that indicate various possibilities.


A) big O notation
B) dark resistor's notation
C) crow's foot notation
D) hash topology notation

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Most date formats now are based on the model established by the International Organization for Standardization (ISO) , which requires a format of _____.


A) two digits for the year, two for the month, and two for the day (YYMMDD)
B) two digits for the day, two for the month, and four for the year (DDMMYYYY)
C) four digits for the year, two for the month, and two for the day (YYYYMMDD)
D) four digits for the year, two for the month, and four for the day (YYYYMMDDDD)

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

In a table or file, each column represents a record and each row represents a field.

A) True
B) False

Correct Answer

verifed

verified

To bridge the gap between a database and the Internet, it is necessary to use a _____, which is software that integrates different applications and allows them to exchange data.


A) middleware
B) stack
C) server
D) firmware

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 86

Related Exams

Show Answer