Deck 12: Databases and Database Management Systems

ملء الشاشة (f)
exit full mode
سؤال
Typically, in hierarchical database management systems, a one-to-one relationship exists between data entities.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
IBM's DB2 program contains a hybrid XML/relational database server.
سؤال
Hashing procedures usually result in two or more records being assigned the same storage address, an event known as a collision.
سؤال
Repairing or restoring data that has become corrupt, such as the result of a storage media error or a computer virus, is a database analysis activity.
سؤال
The data dictionary includes data located in the database tables.
سؤال
If a field needs to store decimal places, the Long Integer field size can be used.
سؤال
Some client-server database systems just have two parts (the clients and the server), others have at least one middle component between the client and the server; these systems are referred to as n-tier database systems.
سؤال
A database that combines object and relational database technology can be referred to as an object-oriented database management system (OODBMS).
سؤال
Many-to-many entity relationships exist when one entity can be related to more than one other entity, and those entities can be related to multiple entities of the same type as the original entity.
سؤال
Normalization is usually viewed as a multistep process, moving the table structures from first normal form (1NF) to usually fifth normal form (5NF).
سؤال
N-tier database systems provide a great deal of flexibility and scalability, allowing the system to be modified as new needs and opportunities arise.
سؤال
A database typically consists of interrelated tables that contain forms and reports.
سؤال
​One of the most common types of software used in conjunction with a multi-dimensional database is Online Analytical Processing (OLAP).
سؤال
Most databases created today do not use the hierarchical or network models; however, these models, which are generally used with legacy mainframe systems, are still operational and so must be maintained.
سؤال
Arranging data for efficient retrieval is called data organization.
سؤال
Data integrity refers to the accuracy of data.
سؤال
Views need to be designed to extract the requested information from a relational database, as efficiently as possible.
سؤال
To protect against data loss caused by a database failure, an accidental deletion, or another problem that renders the main copy of a database unusable, stringent backup procedures should be implemented.
سؤال
Data accessibility refers to protecting data against destruction and misuse-both intentional and accidental.
سؤال
Object-oriented and multidimensional databases are two examples of NoSQL (Not Only SQL) databases.
سؤال
A ____ is a collection of related fields.

A) table
B) field
C) column
D) record
سؤال
A(n) file management system is a program that allows the creation of individual database tables, each of which is stored in its own physical file and is not related to any other file. _________________________
سؤال
Structured query language (SQL) is recognized as the standard query language for relational databases. _________________________
سؤال
A ____ holds a single category of data (such as customer names or employee phone numbers) that will be stored in a database.

A) cell
B) field
C) table
D) record
سؤال
In determining where to store specific data in a(n)  centralized DBMS , factors such as communications cost, response time, storage cost, and security are key considerations. _________________________
سؤال
One advantage of the n-tier architecture is that it allows the program code used to access the database to be separate from the database, and the code can be divided into any number of logical components. _________________________
سؤال
The finished specifications for a table are commonly referred to as the table format . _________________________
سؤال
The field in a table that is used to relate that table to other tables is called the ____.

A) composite key
B) secondary key
C) primary key
D) primary field
سؤال
Software that connects two otherwise separate applications (such as a Web server and a DBMS) is referred to as interware . _________________________
سؤال
NoSQL databases are organized differently than relational databases are organized and therefore, they do not usually use tables and SQL. _________________________
سؤال
At the lowest level, words are entered into database fields (columns), which hold single pieces of data in the database, such as product names or quantities. _________________________
سؤال
To protect against data loss due to disasters, some firms maintain a redundant copy of the database on a(n) mirrored ​drive , backing up the data at very frequent intervals to an off-site location. _________________________
سؤال
Database developers are the people responsible for managing the databases within an organization. _________________________
سؤال
A record is also called a ____.

A) field
B) report
C) row
D) table
سؤال
After all the tables in a database application have been created and their primary keys designated, the tables can be related to one another via their primary keys so that a primary key for one table can be used to extract data from other tables as needed. _________________________
سؤال
One emerging data security risk is the exploitation of known but unpatched vulnerabilities by hackers. _________________________
سؤال
A field is also called a ____.

A) column
B) row
C) table
D) record
سؤال
Objects stored in an OODBMS can be retrieved using queries, such as with queries written in object query language (OQL) -an object-oriented version of SQL. _________________________
سؤال
Cloud databases allow Web pages to be static Web pages; that is, Web pages in which the appearance or content of the pages changes based on the user's input. _________________________
سؤال
Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as creating forms and reports and interfacing with query languages and ____ for complex applications.

A) query wizards
B) programming languages
C) report generators
D) form screens
سؤال
____ are made up of related records.

A) Rows
B) Fields
C) Columns
D) Tables
سؤال
In a typical client-server database application, the client is called the ____.

A) back end
B) rear end
C) portal
D) front end
سؤال
Virtually all DBMSs include a ____ for easy data input, modification, and retrieval.

A) user interface
B) line interface
C) command interface
D) device interface
سؤال
A(n) ____ is a small table consisting only of the primary key field and the location information for each record.

A) tablet
B) keyword
C) index
D) main table
سؤال
The ____ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.

A) database book
B) data dictionary
C) data box
D) data book
سؤال
DBMSs available for use on personal computers include ____ and Corel Paradox.

A) IBM DB2
B) Microsoft Access
C) Adobe Acrobat
D) Adobe Fireworks
سؤال
____ create the actual database based on the design generated by the database designer and get it ready for data entry.

A) Database developers
B) Database administrators (DBAs)
C) Database security officers
D) Database analysts
سؤال
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____.

A) normalization
B) cyclic redundancy check
C) zeroing
D) zonification
سؤال
If a new database is to be used with existing data, the data needs to be transferred from the old files to the new system-a process called ____.

A) data migration
B) data conversion
C) data normalization
D) data accommodation
سؤال
The characteristics of an entity are called ____.

A) attributes
B) variables
C) traits
D) fields
سؤال
With ____, the computer uses each record's primary key field and a mathematical formula called a hashing algorithm to determine a unique address that identifies where the record is physically stored in the database file.

A) real-time organization
B) indexed organization
C) sequenced organization
D) direct organization
سؤال
One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.

A) power of two
B) prime number
C) irrational number
D) transcendental number
سؤال
In ____, the table field involved in the changes is locked until the changes to that field have been completed.

A) column-level locking
B) database locking
C) row-level locking
D) record-level locking
سؤال
A ____ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.

A) form
B) query
C) macro
D) view
سؤال
Individual database tables are often referred to as ____.

A) low files
B) base files
C) flat files
D) clear files
سؤال
____ is a growing concern because of the vast amounts of personal data stored in databases today and the many data privacy breaches that are occurring.

A) Data privacy
B) Data integrity
C) Data accessibility
D) Data legibility
سؤال
Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.

A) records
B) rows
C) fields
D) characters
سؤال
The ____ is the most widely used database model today.

A) hierarchical database management system
B) relational database management system (RDBMS)
C) network database management system
D) database management system (DBMS)
سؤال
One of the properties that can be assigned to a field is a(n) ____ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.

A) format structure
B) input mask
C) data mask
D) data filter
سؤال
With a ____, the databases used by the system are all located on a single computer, such as a server or mainframe computer.

A) distributed database system
B) star database system
C) centralized database system
D) ring database system
سؤال
Continually evaluating and improving the security measures used with the database is a database ____ activity.

A) programming
B) design
C) implementation
D) maintenance
سؤال
Middleware for cloud database applications is commonly written as ____-short sections of code written in a programming or scripting language that are executed by another program.

A) scripts
B) JavaScripts
C) applets
D) utilities
سؤال
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The JL Group is in the process of creating dynamic Web pages to poll politically aware young adults. They are interested in creating scripts that are compatible with many types of databases; therefore, they decide to use the ____ language.

A) CGI
B) API
C) COBOL
D) PHP
سؤال
A(n) ____________________ in a database table must uniquely identify each record in that table.
سؤال
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables.

A) index validation
B) record validation
C) DBA validation
D) dynamic
سؤال
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The employees of JL Group who use the database of the company for their daily work, without having knowledge of how the underlying database is structured, interact with the database ____.

A) using the database script
B) through the database designer
C) through the database programmer
D) using the user interface
سؤال
____________________ entity relationships exist when one entity is related to only one other entity of a particular type.
سؤال
The key characteristics for an OODBMS (including objects, attributes, methods, ____, and inheritance) are similar to the object-oriented programming principles.

A) pages
B) scripting
C) conversion
D) classes
سؤال
To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to create a query object.

A) command
B) line
C) wizard
D) key
سؤال
Case-Based Critical Thinking Questions Case 14-1 James is a recent college graduate and has six months of IT experience. He is thinking about pursuing a certification program in order to demonstrate that he is serious about IT. James is most interested in becoming a database designer. Another name for this career choice is database ____.

A) engineer
B) developer
C) programmer
D) administrator
سؤال
A key component of a DBMS is the ____________________ , the part of the program that actually stores and retrieves data.
سؤال
In ASPs, the code to tie the database to the Web site is typically written in JavaScript or ____.

A) VBScript
B) CGI
C) PHP
D) BasicScript
سؤال
Some database programs allow you to create a table by just entering data and the program will create the ____________________ based on the data entered.
سؤال
The ____________________ in a database system are the ones who enter data, update data, and retrieve information from the database when necessary.
سؤال
A ____ displays table information with a more formal, businesslike appearance.

A) report
B) query
C) form
D) field
سؤال
Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____.

A) middleware
B) capsules
C) macros
D) applets
سؤال
Case-Based Critical Thinking Questions Case 14-1 James is a recent college graduate and has six months of IT experience. He is thinking about pursuing a certification program in order to demonstrate that he is serious about IT. James learns that database designers work with systems analysts and other individuals involved in the ____.

A) CCP
B) DBMS
C) SDLC
D) CDMP
سؤال
The term ____ refers to a wide variety of different database technologies that were developed in order to overcome some of the limitations of relational databases.

A) multidimensional
B) object-oriented
C) NoSQL
D) SQL
سؤال
____________________ refers to the process of ensuring that the data entered into a database matches the specified type, format, and allowable value for each field.
سؤال
____ databases are designed to store a collection of summarized data for quick and easy data analysis.

A) Relational
B) Object-oriented
C) Analytical
D) Multidimensional
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Databases and Database Management Systems
1
Typically, in hierarchical database management systems, a one-to-one relationship exists between data entities.
False
2
IBM's DB2 program contains a hybrid XML/relational database server.
True
3
Hashing procedures usually result in two or more records being assigned the same storage address, an event known as a collision.
True
4
Repairing or restoring data that has become corrupt, such as the result of a storage media error or a computer virus, is a database analysis activity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
5
The data dictionary includes data located in the database tables.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
6
If a field needs to store decimal places, the Long Integer field size can be used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
7
Some client-server database systems just have two parts (the clients and the server), others have at least one middle component between the client and the server; these systems are referred to as n-tier database systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
8
A database that combines object and relational database technology can be referred to as an object-oriented database management system (OODBMS).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
9
Many-to-many entity relationships exist when one entity can be related to more than one other entity, and those entities can be related to multiple entities of the same type as the original entity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
10
Normalization is usually viewed as a multistep process, moving the table structures from first normal form (1NF) to usually fifth normal form (5NF).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
11
N-tier database systems provide a great deal of flexibility and scalability, allowing the system to be modified as new needs and opportunities arise.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
12
A database typically consists of interrelated tables that contain forms and reports.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
13
​One of the most common types of software used in conjunction with a multi-dimensional database is Online Analytical Processing (OLAP).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
14
Most databases created today do not use the hierarchical or network models; however, these models, which are generally used with legacy mainframe systems, are still operational and so must be maintained.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
15
Arranging data for efficient retrieval is called data organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
16
Data integrity refers to the accuracy of data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
17
Views need to be designed to extract the requested information from a relational database, as efficiently as possible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
18
To protect against data loss caused by a database failure, an accidental deletion, or another problem that renders the main copy of a database unusable, stringent backup procedures should be implemented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
19
Data accessibility refers to protecting data against destruction and misuse-both intentional and accidental.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
20
Object-oriented and multidimensional databases are two examples of NoSQL (Not Only SQL) databases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
21
A ____ is a collection of related fields.

A) table
B) field
C) column
D) record
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
22
A(n) file management system is a program that allows the creation of individual database tables, each of which is stored in its own physical file and is not related to any other file. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
23
Structured query language (SQL) is recognized as the standard query language for relational databases. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
24
A ____ holds a single category of data (such as customer names or employee phone numbers) that will be stored in a database.

A) cell
B) field
C) table
D) record
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
25
In determining where to store specific data in a(n)  centralized DBMS , factors such as communications cost, response time, storage cost, and security are key considerations. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
26
One advantage of the n-tier architecture is that it allows the program code used to access the database to be separate from the database, and the code can be divided into any number of logical components. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
27
The finished specifications for a table are commonly referred to as the table format . _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
28
The field in a table that is used to relate that table to other tables is called the ____.

A) composite key
B) secondary key
C) primary key
D) primary field
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
29
Software that connects two otherwise separate applications (such as a Web server and a DBMS) is referred to as interware . _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
30
NoSQL databases are organized differently than relational databases are organized and therefore, they do not usually use tables and SQL. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
31
At the lowest level, words are entered into database fields (columns), which hold single pieces of data in the database, such as product names or quantities. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
32
To protect against data loss due to disasters, some firms maintain a redundant copy of the database on a(n) mirrored ​drive , backing up the data at very frequent intervals to an off-site location. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
33
Database developers are the people responsible for managing the databases within an organization. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
34
A record is also called a ____.

A) field
B) report
C) row
D) table
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
35
After all the tables in a database application have been created and their primary keys designated, the tables can be related to one another via their primary keys so that a primary key for one table can be used to extract data from other tables as needed. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
36
One emerging data security risk is the exploitation of known but unpatched vulnerabilities by hackers. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
37
A field is also called a ____.

A) column
B) row
C) table
D) record
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
38
Objects stored in an OODBMS can be retrieved using queries, such as with queries written in object query language (OQL) -an object-oriented version of SQL. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
39
Cloud databases allow Web pages to be static Web pages; that is, Web pages in which the appearance or content of the pages changes based on the user's input. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
40
Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as creating forms and reports and interfacing with query languages and ____ for complex applications.

A) query wizards
B) programming languages
C) report generators
D) form screens
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
41
____ are made up of related records.

A) Rows
B) Fields
C) Columns
D) Tables
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
42
In a typical client-server database application, the client is called the ____.

A) back end
B) rear end
C) portal
D) front end
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
43
Virtually all DBMSs include a ____ for easy data input, modification, and retrieval.

A) user interface
B) line interface
C) command interface
D) device interface
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
44
A(n) ____ is a small table consisting only of the primary key field and the location information for each record.

A) tablet
B) keyword
C) index
D) main table
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
45
The ____ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.

A) database book
B) data dictionary
C) data box
D) data book
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
46
DBMSs available for use on personal computers include ____ and Corel Paradox.

A) IBM DB2
B) Microsoft Access
C) Adobe Acrobat
D) Adobe Fireworks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
47
____ create the actual database based on the design generated by the database designer and get it ready for data entry.

A) Database developers
B) Database administrators (DBAs)
C) Database security officers
D) Database analysts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
48
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____.

A) normalization
B) cyclic redundancy check
C) zeroing
D) zonification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
49
If a new database is to be used with existing data, the data needs to be transferred from the old files to the new system-a process called ____.

A) data migration
B) data conversion
C) data normalization
D) data accommodation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
50
The characteristics of an entity are called ____.

A) attributes
B) variables
C) traits
D) fields
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
51
With ____, the computer uses each record's primary key field and a mathematical formula called a hashing algorithm to determine a unique address that identifies where the record is physically stored in the database file.

A) real-time organization
B) indexed organization
C) sequenced organization
D) direct organization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
52
One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.

A) power of two
B) prime number
C) irrational number
D) transcendental number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
53
In ____, the table field involved in the changes is locked until the changes to that field have been completed.

A) column-level locking
B) database locking
C) row-level locking
D) record-level locking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
54
A ____ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.

A) form
B) query
C) macro
D) view
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
55
Individual database tables are often referred to as ____.

A) low files
B) base files
C) flat files
D) clear files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
56
____ is a growing concern because of the vast amounts of personal data stored in databases today and the many data privacy breaches that are occurring.

A) Data privacy
B) Data integrity
C) Data accessibility
D) Data legibility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
57
Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.

A) records
B) rows
C) fields
D) characters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
58
The ____ is the most widely used database model today.

A) hierarchical database management system
B) relational database management system (RDBMS)
C) network database management system
D) database management system (DBMS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
59
One of the properties that can be assigned to a field is a(n) ____ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.

A) format structure
B) input mask
C) data mask
D) data filter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
60
With a ____, the databases used by the system are all located on a single computer, such as a server or mainframe computer.

A) distributed database system
B) star database system
C) centralized database system
D) ring database system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
61
Continually evaluating and improving the security measures used with the database is a database ____ activity.

A) programming
B) design
C) implementation
D) maintenance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
62
Middleware for cloud database applications is commonly written as ____-short sections of code written in a programming or scripting language that are executed by another program.

A) scripts
B) JavaScripts
C) applets
D) utilities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
63
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The JL Group is in the process of creating dynamic Web pages to poll politically aware young adults. They are interested in creating scripts that are compatible with many types of databases; therefore, they decide to use the ____ language.

A) CGI
B) API
C) COBOL
D) PHP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
64
A(n) ____________________ in a database table must uniquely identify each record in that table.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
65
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables.

A) index validation
B) record validation
C) DBA validation
D) dynamic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
66
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The employees of JL Group who use the database of the company for their daily work, without having knowledge of how the underlying database is structured, interact with the database ____.

A) using the database script
B) through the database designer
C) through the database programmer
D) using the user interface
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
67
____________________ entity relationships exist when one entity is related to only one other entity of a particular type.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
68
The key characteristics for an OODBMS (including objects, attributes, methods, ____, and inheritance) are similar to the object-oriented programming principles.

A) pages
B) scripting
C) conversion
D) classes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
69
To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to create a query object.

A) command
B) line
C) wizard
D) key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
70
Case-Based Critical Thinking Questions Case 14-1 James is a recent college graduate and has six months of IT experience. He is thinking about pursuing a certification program in order to demonstrate that he is serious about IT. James is most interested in becoming a database designer. Another name for this career choice is database ____.

A) engineer
B) developer
C) programmer
D) administrator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
71
A key component of a DBMS is the ____________________ , the part of the program that actually stores and retrieves data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
72
In ASPs, the code to tie the database to the Web site is typically written in JavaScript or ____.

A) VBScript
B) CGI
C) PHP
D) BasicScript
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
73
Some database programs allow you to create a table by just entering data and the program will create the ____________________ based on the data entered.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
74
The ____________________ in a database system are the ones who enter data, update data, and retrieve information from the database when necessary.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
75
A ____ displays table information with a more formal, businesslike appearance.

A) report
B) query
C) form
D) field
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
76
Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____.

A) middleware
B) capsules
C) macros
D) applets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
77
Case-Based Critical Thinking Questions Case 14-1 James is a recent college graduate and has six months of IT experience. He is thinking about pursuing a certification program in order to demonstrate that he is serious about IT. James learns that database designers work with systems analysts and other individuals involved in the ____.

A) CCP
B) DBMS
C) SDLC
D) CDMP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
78
The term ____ refers to a wide variety of different database technologies that were developed in order to overcome some of the limitations of relational databases.

A) multidimensional
B) object-oriented
C) NoSQL
D) SQL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
79
____________________ refers to the process of ensuring that the data entered into a database matches the specified type, format, and allowable value for each field.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
80
____ databases are designed to store a collection of summarized data for quick and easy data analysis.

A) Relational
B) Object-oriented
C) Analytical
D) Multidimensional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.